Professional Documents
Culture Documents
Computational Intelligence and Blockchain - Pankaj Bhambri
Computational Intelligence and Blockchain - Pankaj Bhambri
and Blockchain in
Biomedical and
Health Informatics
Advancements in computational intelligence, which encompasses artificial
intelligence, machine learning, and data analytics, have revolutionized the way
we process and analyze biomedical and health data. These techniques offer
novel approaches to understanding complex biological systems, improving
disease diagnosis, optimizing treatment plans, and enhancing patient outcomes.
Computational Intelligence and Blockchain in Biomedical and Health Informatics
introduces the role of computational intelligence and blockchain in the biomedical
and health informatics fields and provides a framework and summary of the various
methods. The book emphasizes the role of advanced computational techniques and
offers demonstrative examples throughout. Techniques to analyze the impacts on
the biomedical and health informatics domains are discussed along with major
challenges in deployment. Rounding out the book are highlights of the transformative
potential of computational intelligence and blockchain in addressing critical issues
in healthcare from disease diagnosis and personalized medicine to health data
management and interoperability along with two case studies. This book is highly
beneficial to educators, researchers, and anyone involved with health data.
Features:
• Introduces the role of computational intelligence and blockchain in the
biomedical and health informatics fields.
• Provides a framework and a summary of various computational intelligence
and blockchain methods.
• Emphasizes the role of advanced computational techniques and offers
demonstrative examples throughout.
• Techniques to analyze the impact on biomedical and health informatics are
discussed along with major challenges in deployment.
• Highlights the transformative potential of computational intelligence and
blockchain in addressing critical issues in healthcare from disease diagnosis
and personalized medicine to health data management and interoperability.
Computational Intelligence
and Blockchain in
Biomedical and Health
Informatics
Edited by
Pankaj Bhambri, Sita Rani, and
Muhammad Fahim
Designed cover image: Shutterstock
First edition published 2024
by CRC Press
2385 Executive Center Drive, Suite 320, Boca Raton, FL 33431
and by CRC Press
4 Park Square, Milton Park, Abingdon, Oxon, OX14 4RN
CRC Press is an imprint of Taylor & Francis Group, LLC
© 2024 selection and editorial matter, Pankaj Bhambri, Sita Rani, and Muhammad Fahim; individual
chapters, the contributors
Reasonable efforts have been made to publish reliable data and information, but the author and publisher
cannot assume responsibility for the validity of all materials or the consequences of their use. The
authors and publishers have attempted to trace the copyright holders of all material reproduced in
this publication and apologize to copyright holders if permission to publish in this form has not been
obtained. If any copyright material has not been acknowledged please write and let us know so we may
rectify in any future reprint.
Except as permitted under U.S. Copyright Law, no part of this book may be reprinted, reproduced,
transmitted, or utilized in any form by any electronic, mechanical, or other means, now known or
hereafter invented, including photocopying, microfilming, and recording, or in any information storage
or retrieval system, without written permission from the publishers.
For permission to photocopy or use material electronically from this work, access www.copyright.com
or contact the Copyright Clearance Center, Inc. (CCC),
222 Rosewood Drive, Danvers, MA 01923, 978–750–8400. For works that are not available on CCC
please contact mpkbookspermissions@tandf.co.uk
Trademark notice: Product or corporate names may be trademarks or registered trademarks and are used
only for identification and explanation without intent to infringe.
Library of Congress Cataloging‑in‑Publication Data
Names: Bhambri, Pankaj, editor. | Rani, Sita, editor. | Fahim, Muhammad (Researcher in artificial
intelligence), editor.
Title: Computational intelligence and blockchain in biomedical and health informatics / edited by
Panjak Bhambri, Sita Rani, and Muhammad Fahim.
Description: First edition. | Boca Raton : CRC Press, 2025. | Includes bibliographical references and
index. | Summary: “Advancements in computational intelligence, which encompasses artificial
intelligence, machine learning, and data analytics, have revolutionized the way we process and
analyze biomedical and health data. These techniques offer novel approaches to understanding
complex biological systems, improving disease diagnosis, optimizing treatment plans, and enhancing
patient outcomes. Computational Intelligence and Blockchain in Biomedical and Health Informatics
introduces the role of computational intelligence and blockchain in the biomedical and health
informatics fields and provides a framework and summary of the various methods”— Provided by
publisher.
Identifiers: LCCN 2023057700 | ISBN 9781032604701 (hardback) | ISBN 9781032604800 (paperback) |
ISBN 9781003459347 (ebook)
Subjects: LCSH: Artificial intelligence—Medical applications. | Blockchains (Databases) | Medicine—
Data processing. | Computational intelligence.
Classification: LCC R859.7.A78 C6383 2025 | DDC 610.285—dc23/eng/20240319
LC record available at https://lccn.loc.gov/2023057700
ISBN: 978-1-032-60470-1 (hbk)
ISBN: 978-1-032-60480-0 (pbk)
ISBN: 978-1-003-45934-7 (ebk)
DOI: 10.1201/9781003459347
Typeset in Times LT Std
by Apex CoVantage, LLC
Contents
Preface��������������������������������������������������������������������������������������������������������������������� xix
Authors..................................................................................................................... xxi
List of Contributors����������������������������������������������������������������������������������������������� xxiii
Index���������������������������������������������������������������������������������������������������������������������� 333
Preface
This book explores the intersection of two rapidly evolving fields, computational
intelligence, and blockchain technology, and their profound impact on biomedical
and health informatics. As editors, we are delighted to present this collection of
insightful contributions from leading researchers and practitioners in the field.
Advancements in computational intelligence, which encompasses artificial intelli-
gence, machine learning, and data analytics, have revolutionized the way we process
and analyze biomedical and health data. These techniques offer novel approaches to
understanding complex biological systems, improving disease diagnosis, optimiz-
ing treatment plans, and enhancing patient outcomes. By harnessing the power of
computational intelligence, we can unlock new insights and accelerate progress in
healthcare. In parallel, blockchain technology has emerged as a transformative force
in various industries, and healthcare is no exception. With its inherent properties of
decentralization, immutability, and transparency, blockchain has the potential to rev-
olutionize the way health data is stored, shared, and secured. It enables the creation of
tamper-resistant health records, facilitates secure data exchange among stakeholders,
and empowers patients to have greater control over their personal health information.
This book provides a comprehensive overview of the applications, challenges, and
opportunities arising from the fusion of computational intelligence and blockchain
in the field of biomedical and health informatics. The chapters cover a wide range
of topics, including intelligent data analysis, predictive modelling, clinical decision
support systems, privacy and security in healthcare, patient-centric approaches, and
the integration of blockchain with other emerging technologies. The contributions
in this book highlight the transformative potential of computational intelligence and
blockchain in addressing critical issues in healthcare. From disease diagnosis and
personalized medicine to health data management and interoperability, these tech-
nologies have the potential to drive significant advancements and reshape the future
of healthcare.
We would like to express our gratitude to the authors who have contributed their
expertise and insights to this volume. Their dedication and commitment to advanc-
ing the field have made this book a valuable resource for researchers, practitioners,
and students interested in the intersection of computational intelligence, blockchain,
and healthcare. We hope that this book serves as a catalyst for further exploration nd
innovation in the field of biomedical and health informatics. We invite readers to
delve into the chapters, engage with the ideas presented, and envision the transfor-
mative possibilities that computational intelligence and blockchain bring to the realm
of healthcare.
xix
Authors
Dr. Pankaj Bhambri is affiliated with the Department of Information Technology at
Guru Nanak Dev Engineering College in Ludhiana. Additionally, he fulfills the role
of convener for his departmental board of studies. He possesses nearly two decades of
teaching experience. He is an active member of IE India, ISTE New Delhi, IIIE Navi
Mumbai, IETE New Delhi, and CSI Mumbai. He has contributed to various research
activities while publishing articles in the renowned SCIE and Scopus journals
and conference proceedings. He has also published several international patents.
Dr. Bhambri has garnered extensive experience in the realm of academic publishing,
having served as an editor/author for a multitude of books in collaboration with
esteemed publishing houses such as CRC Press, Elsevier, Scrivener, and Bentham
Science. Dr. Bhambri has been honored with several prestigious accolades, including
the ISTE Best Teacher Award in 2023 and 2022, the I2OR National Award in
2020, the Green ThinkerZ Top 100 International Distinguished Educators Award
in 2020, the I2OR Outstanding Educator Award in 2019, the SAA Distinguished
Alumni Award in 2012, the CIPS Rashtriya Rattan Award in 2008, the LCHC
Best Teacher Award in 2007, and numerous other commendations from various
government and non-profit organizations. He has provided guidance and oversight
for numerous research projects and dissertations at the postgraduate and Ph.D.
levels. He successfully organized a diverse range of educational programs, securing
financial backing from esteemed institutions such as the AICTE, the TEQIP, among
others. Dr. Bhambri’s areas of interest encompass machine learning, bioinformatics,
wireless sensor networks, and network security.
Dr. Sita Rani works in the Department of Computer Science and Engineering at
Guru Nanak Dev Engineering College, Ludhiana. She earned her Ph.D. in Computer
Science and Engineering from I.K. Gujral Punjab Technical University, Kapurthala,
Punjab, in 2018. She has also completed the Postgraduate Certificate Program in Data
Science and Machine Learning from the Indian Institute of Technology, Roorkee, in
2023. She completed her postdoc from the Big Data Mining and Machine Learning
Lab, South Ural State University, Russia, in August 2023. She has more than 20 years
of teaching experience. She is an active member of ISTE, IEEE, and IAEngg. She
is the recipient of the ISTE Section Best Teacher Award-2020 and the International
Young Scientist Award-2021. She has contributed to various research activities
while publishing articles in the renowned SCI and Scopus journals and conference
proceedings. She has published several international patents and authored/edited/
coedited eight books. Dr. Rani has delivered many expert talks in A.I.C.T.E.-
sponsored faculty development programs and keynote talks at many national and
international conferences. She has also organized many international conferences
during her 20 years of teaching experience. She is a member of the editorial board
and a reviewer of many international journals of repute. She has also been the vice
president of SME and MSME (UT Council) and the Women Indian Chamber of
xxi
xxii Authors
Commerce and Industry (WICCI) for the last 3 years. Her research interests include
parallel and distributed computing, data science, machine learning, the Internet of
Things (IoT), and smart healthcare.
xxiii
xxiv Contributors
S. Sharmila S. Velmurugan
Dr. N.G.P. Institute of Technology Dr. N.G.P. Institute of Technology
Coimbatore, Tamil Nadu, India Coimbatore, Tamil Nadu, India
1 Bioengineering and
Healthcare Data Analysis
Introduction, Advances,
and Challenges
Pankaj Bhambri and Sita Rani
1.1 INTRODUCTION
Bioengineering, commonly known as biomedical engineering, is a multidisciplinary
field that integrates principles of engineering and biological sciences to generate
creative solutions for healthcare, medicine, and the betterment of human life. This
ever-expanding field of study is essential to the solution of difficult problems in
healthcare and biotechnology. Bioengineers are scientists and engineers who apply
their knowledge of biology, chemistry, physics, and engineering to the development
of new technologies. They put their knowledge to use in creating innovative med-
ications, medical equipment, tissue engineering strategies, and diagnostic instru-
ments. These developments have a significant effect on patient care by increasing the
precision of medical diagnosis and the efficacy of therapies. The creation of useful
medical tools is an important application of bioengineering. Bioengineers improve
people’s lives by developing medical technologies including pacemakers, prosthetic
limbs, and artificial organs (Kaur, Singh, & Rani, 2023). As for regenerative medi-
cine, they were the first to investigate methods of growing and transplanting tissues
and organs. Bioengineers are crucial to the pharmaceutical industry, both in drug
development and distribution. To minimize unwanted effects and maximize thera-
peutic gains, they develop drug delivery methods that zero in on specific tissues or
cells. They also create novel treatments like gene therapies and personalized medi-
cine that are specifically designed for the patient. The field of bioengineering also has
a major effect on how we see biological systems. Advances in biotechnology, such as
the creation of biofuels, bio-based products, and more sustainably implemented agri-
cultural practices, rely on bioengineers’ ability to alter and comprehend biological
processes at the molecular level through the use of tools like genomics and synthetic
biology (Kataria, Puri, Pareek, & Rani, 2023, July).
Rani, Kumar, & Lavinia, 2022). The discipline has far-reaching implications, affect-
ing many areas of healthcare delivery.
1.2.1 Basics of Bioengineering
Bioengineering is the practice of creating medical solutions by combining engi-
neering with biological sciences, making artificial limbs and other prostheses, as
well as investigating tissue engineering for regenerative medicine (Puri, Kataria,
Rani, & Pareek, 2023, September). It is essential to have knowledge of biomateri-
als and their acceptability by the human body. Biomechanics is used to study the
effects of mechanical forces on living things. Engineers with a focus on biology
and medicine work to advance diagnostic imaging tools. To guarantee the efficacy
and safety of new medical developments, it is essential to adhere to all applicable
regulations and ethical standards. Collaboration with healthcare practitioners and
scientists is prevalent, contributing to the continuing progress of healthcare and
the quality of life. Bioengineering comprises the various subdomains shown in
Figure 1.1.
Bioengineering and Healthcare Data Analysis 5
smart watches. Individuals are better able to take control of their health with
the use of this data, and healthcare providers are able to remotely monitor
patients, which results in prompt interventions and individualized care plans
(Rani, Kataria, Kumar, & Tiwari, 2023).
Health Apps and Patient Portals: The rise of patient portals and mobile
health apps has empowered individuals to take an active role in their health-
care management. These online tools allow patients to coordinate their treat-
ment, receive their test results, and have direct dialogue with their doctors.
Patient preferences, treatment plan adherence, and broader health trends can
all be better understood with the information gleaned from these exchanges.
Clinical Trials and Research Databases: Medical advancements can be attrib-
uted, in part, to the information gathered by research databases and clinical
trial repositories. These sources help researchers spot patterns, measure
treatment efficacy, and uncover new remedies. For medical research to pro-
gress and evidence-based procedures to be developed, easy access to large
and varied datasets is essential (Bali, Bali, Gaur, Rani, & Kumar, 2023).
Public Health Surveillance Systems: Public health agencies rely on surveil-
lance systems to track the spread of diseases and take appropriate action
when necessary. Hospitals, labs, and community health centers are just
some of the places from which these systems gather and analyze data. In
order to identify outbreaks, adopt preventative measures, and shape public
health policy, timely and reliable information is essential.
Pharmacy and Claims Data: Patient compliance and treatment efficacy can
be gleaned from pharmacy data, such as drug dispensing and adherence
information. Insurance companies’ claim records provide a more compre-
hensive picture of healthcare consumption, expenditures, and trends. This
information is useful for managing the health of a population by revealing
ways to cut costs without sacrificing quality.
while unlabelled data is used in unsupervised learning. Decision trees, support vec-
tor machines, and neural networks are all examples of common machine learning
methods.
Data-driven decision-making is essential in many fields, including healthcare,
finance, and technology, and both statistical and machine learning approaches play
important roles in this process. The statistical approaches’ rigor in inference and
interpretation is complemented by the versatility of machine learning in processing
high-dimensional data for applications like image recognition and NLP. Integrating
these methods furthers the development of AI and data science by improving our
capacity to analyze and draw conclusions from a wide variety of information.
1.3.3 Personalized Medicine
Bioengineering data analysis deciphers patient-specific genetic, proteomic, and clin-
ical information to personalize healthcare to each person. This method allows for
more precise and individualized treatment plans by enhancing disease detection,
optimizing therapeutic approaches, and reducing unwanted side effects.
analysis of vital signs and other physiological parameters, allowing for timely inter-
ventions. By allowing for constant monitoring and the early discovery of health
issues, this application improves patient outcomes across the board but especially in
underserved and rural areas.
well as medical sensors are among the gadgets that track health and wellness metrics.
Personalized healthcare insights are made possible by the seamless data exchange
made possible by IoT integration. This convergence of technologies allows for con-
stant tracking of health, early identification of disease, and remote patient monitor-
ing, all of which contribute to progress in preventative and individualized treatment.
Transparency, on the other hand, is essential for establishing the ethical foun-
dation of bioengineering and healthcare data analysis. Transparent methodologies
allow researchers, practitioners, and regulatory bodies to scrutinize the data sources,
algorithms, and validation processes. This openness is crucial for identifying biases,
errors, or ethical concerns that may arise during data analysis. Furthermore, trans-
parent data analysis practices foster accountability, ensuring that the results and deci-
sions made based on the analysis are trustworthy and align with ethical standards
(O’Reilly & Smith, 2021).
In the context of healthcare, ensuring interpretability and transparency is not only
an ethical consideration but also a legal requirement. Regulatory entities frequently
need comprehensive documentation of the procedures and methodologies employed
in the analysis of healthcare data to ensure the protection of patient confidentiality,
safeguarding of data integrity, and adherence to prevailing legislation.
To overcome these challenges, researchers and practitioners in bioengineering
and healthcare data analysis are increasingly focusing on developing interpretable
machine learning models and adopting transparent methodologies. The objective of
techniques such as explainable artificial intelligence (XAI) is to offer elucidation into
the decision-making mechanisms employed by intricate models. Additionally, there
is a growing emphasis on incorporating domain expertise, collaborating with health-
care professionals, and adopting clear documentation practices to enhance interpret-
ability and transparency in the analysis of healthcare data (Tondon &Bhambri, 2017).
These efforts are crucial for building trust among stakeholders, ensuring the ethical
use of data, and ultimately advancing the application of data-driven approaches in
bioengineering and healthcare.
Privacy Concerns: One of the primary ethical issues in healthcare data analy-
sis is the protection of patient privacy. As datasets become larger and more
interconnected, there is an increased risk of re-identification of individu-
als. Researchers and analysts must implement robust de-identification tech-
niques to safeguard the anonymity of patients and prevent the misuse of
their health information.
Informed Consent: Obtaining informed consent is a critical ethical consider-
ation. Patients should be fully informed about how their data will be used,
who will have access to it, and for what purposes. Ensuring that individuals
have the option to opt in or opt out of data analysis is essential in respecting
their autonomy and right to control their personal health information.
Bioengineering and Healthcare Data Analysis 13
1.5.4 Regulatory Compliance
The fields of bioengineering and healthcare data analysis pose a multitude of
obstacles and ethical considerations as a result of the inherently sensitive nature
of health-related information. Compliance with regulations is crucial to safeguard
patient privacy, maintain data integrity, and uphold ethical standards. Here’s a
detailed exploration of regulatory compliance in the realm of ethical issues in health-
care data analysis (Gupta & Singh, 2020):
large and diverse datasets. Here’s a detailed discussion of the key aspects of integra-
tive bioengineering and data analysis:
1.7 CASE STUDIES
A case study of the particular topic elaborates the practicality of the domain con-
cerned and thus offers the expert exposure needed for greater understanding. The
following case studies are elaborated on and shared for the purpose of deep coverage
of bioengineering and healthcare data analysis:
Methodology:
Dataset Compilation: Collect a comprehensive dataset comprising electro-
cardiogram (ECG) recordings, medical imaging (e.g., MRI and CT scans),
patient electronic health records (EHRs), and genetic information.
Data Preprocessing: The data should be subjected to cleaning and prepro-
cessing in order to assure consistency and remove any noise present. The
20 Computational Intelligence in Biomedical and Health Informatics
Results: The machine learning model exhibits superior diagnostic accuracy com-
pared to traditional methods, showcasing its ability to analyze complex, multimodal
datasets. The model’s predictive capabilities demonstrate potential improvements in
early detection, allowing for proactive medical interventions.
Conclusion: This case study serves as an illustration of the profound influence
that the use of machine learning techniques has had on disease diagnosis in the
domain of cardiology. The results highlight the potential for enhanced accuracy and
efficiency in identifying cardiac conditions, paving the way for more personalized
and timely patient care. As machine learning continues to advance, its integration
into healthcare data analysis holds immense promise for improving diagnostic preci-
sion and ultimately transforming patient outcomes.
Objectives:
To enhance data security and integrity in the storage and sharing of patient
health records.
To establish a transparent and auditable system for tracking the provenance of
healthcare data.
To streamline the data analysis process, ensuring efficient and secure access to
bioengineering and healthcare datasets.
Bioengineering and Healthcare Data Analysis 21
Implementation Steps:
System Architecture Design: Define the blockchain network architecture,
including nodes, consensus mechanisms, and smart contract functionalities.
Integrate the blockchain system with existing healthcare databases and bio-
engineering data repositories.
Patient Data Onboarding: Implement a secure and user-friendly process for
onboarding patient health records onto the blockchain. To ensure adherence
to data privacy standards, such as the HIPAA, it is imperative to use encryp-
tion protocols and establish permission-based access controls.
Smart Contracts for Data Access and Analysis: Develop smart contracts to
govern data access based on predefined permissions. Implement automated,
blockchain-based data analysis processes to enhance efficiency.
Interoperability and Integration: Establish interoperability standards to ena-
ble seamless integration with other healthcare systems. Ensure compatibil-
ity with existing bioengineering and healthcare data analysis tools.
User Training and Adoption: Conduct training sessions for healthcare pro-
fessionals, bioengineers, and data analysts on using the blockchain system.
Implement user-friendly interfaces to encourage adoption and adherence to
best practices.
Enhanced Data Security: The decentralized and cryptographic nature of the block-
chain ensured robust protection against unauthorized access and tampering.
Improved Data Transparency: Stakeholders could trace the entire lifecycle
of healthcare data, promoting transparency and accountability.
Streamlined Data Analysis: Smart contracts facilitated automated and secure
data analysis processes, reducing the time required for insights generation.
Conclusion: This case study provides valuable insights into the successful integra-
tion of blockchain in the healthcare domain, emphasizing its potential to revolu-
tionize bioengineering and healthcare data analysis. The outcomes highlight the
importance of blockchain in addressing longstanding challenges, fostering a more
secure, transparent, and efficient healthcare ecosystem. As the industry continues
to explore innovative solutions, the adoption of blockchain technology stands as a
promising step toward the future of healthcare data management and analysis.
Key Considerations:
Informed Consent: The team must assess whether the initial consent pro-
vided by patients adequately covers the extensive data analysis and poten-
tial long-term use of their information. Are patients aware of the full scope
of the research, and do they have the option to withdraw their consent at
any stage?
Data Security: Given the escalating occurrence of cyberattacks and data
breaches, the team is confronted with the task of implementing robust
security measures in order to protect patient information effectively. What
measures may be used to ensure the preservation of data integrity and confi-
dentiality during the entirety of the study procedure?
Transparency: The ethical responsibility of the research team includes main-
taining transparency about the goals, methods, and potential implications of
the study. How can the team effectively communicate these aspects to the
patients, ensuring that they understand the purpose and potential impact of
the research?
Beneficence vs. Autonomy: Balancing the potential benefits of the research,
which could revolutionize treatment approaches for the genetic disorder,
with the individual autonomy and rights of the patients is a critical ethical
consideration. How can the team ensure that the research aligns with the
principles of beneficence without compromising patient autonomy?
Potential Solutions:
Enhanced Informed Consent Process: Implement a comprehensive and
ongoing informed consent process that involves clear communication about
the research objectives, potential risks, and the right to withdraw consent.
Data Anonymization: Utilize advanced techniques to anonymize patient data,
ensuring that individuals cannot be readily identified while still allowing for
meaningful analysis.
Ethics Review Board: Seek input and approval from an independent ethics
review board to ensure that the research adheres to ethical standards and
prioritizes patient welfare.
Patient Engagement: Actively involve patients in the decision-making pro-
cess and solicit their input on matters related to data use, privacy, and the
overall direction of the research.
Bioengineering and Healthcare Data Analysis 23
By addressing these ethical considerations, the research team can navigate the
complexities of healthcare data analysis in bioengineering, foster trust, and ensure
that the benefits of the research are realized ethically and responsibly.
1.8 CONCLUSION
Throughout the course of this chapter, a number of significant findings have sur-
faced, underscoring the capacity of these technologies to drive progress in the fields
of healthcare data analysis and bioengineering.
1.8.3 Closing Remarks
In conclusion, the chapter emphasizes that the convergence of computational intel-
ligence and blockchain in biomedical and health informatics is not just a techno-
logical advancement but a paradigm shift. It has the potential to revolutionize how
we approach healthcare from diagnosis to treatment and from data management to
patient empowerment. As we navigate this transformative landscape, it is crucial
to address challenges related to interoperability, regulatory frameworks, and ethi-
cal considerations. The collaborative efforts of researchers, healthcare professionals,
and technologists will be pivotal in harnessing the full potential of computational
24 Computational Intelligence in Biomedical and Health Informatics
intelligence and blockchain for the betterment of healthcare worldwide. This chapter
serves as a stepping stone toward realizing a future where data-driven insights and
secure, decentralized systems converge to elevate the standards of healthcare and
bioengineering.
REFERENCES
Adams, J. M., & Smith, R. E. (2020). Bioinformatics in Healthcare: A Comprehensive Over‑
view. Academic Press.
Anand, A., & Bhambri, P. (2018). Orientation, Scale and Location Invariant Character Recog-
nition System Using Neural Networks. International Journal of Theoretical & Applied
Sciences, 10(1), 106–109.
Bali, V., Bali, S., Gaur, D., Rani, S., & Kumar, R. (2023). Commercial-Off-the Shelf Vendor
Selection: A Multi-Criteria Decision-Making Approach Using Intuitionistic Fuzzy Sets
and TOPSIS. Operational Research in Engineering Sciences: Theory and Applications,
1, 25–45.
Bhambri, P., & Gupta, O. P. (2016). Phylogenetic Tree Construction with Optimum Multiple
Sequence Alignment. Biological Forum: An International Journal, 8(2), 330–339.
Bhambri, P., & Gupta, O. P. (2017). Applying Distributed Processing for Different Distance
Based Methods During Phylogenetic Tree Construction. Asian Journal of Computer
Science and Information Technology, 7(3), 57–67.
Bhambri, P., & Gupta, O.P. (2018). Implementing Machine Learning Algorithms for Distance
Based Phylogenetic Trees. I.K. Gujral Punjab Technical University.
Bhambri, P., Sinha, V.K., Dhanoa, I.S., & Kaur, J. (2019). Genome DNA Sequence Match�-
ing Using HBM Algorithm. International Journal of Control and Automation, 12(5),
531–539.
Brown, A. L., & Patel, M. S. (2018). Data Analytics in Biomedical Engineering: Techniques
and Applications. Springer.
Chen, H., & Wang, F. (Eds.). (2019). Biomedical Data Management and Graph Online Query‑
ing: VLDB 2019 Workshops. Springer.
Davis, C. R., & Jones, P. Q. (2021). Blockchain Applications in Healthcare: A Comprehensive
Review. IEEE Transactions on Biomedical Engineering, 68(6), 1685–1698.
Edwards, D. S., & White, B. A. (2017). Healthcare Data Analytics and Management: Emerg‑
ing Technologies and Applications. IGI Global.
Fong, S., & Wu, Y. (Eds.). (2019). Blockchain for Secure and Collaborative Healthcare.
Springer.
Gupta, R., & Singh, D. (2020). Artificial Intelligence in Healthcare: Challenges and Oppor‑
tunities. IGI Global.
Harris, R. A., & Patel, K. D. (2018). Big Data Analytics in Healthcare: Promise and Potential.
Health Information Science and Systems, 6(1), 3.
Johnson, M., & Brown, K. L. (2016). Biomedical Signal and Image Processing in Patient
Care. CRC Press.
Kataria, A., Agrawal, D., Rani, S., Karar, V., & Chauhan, M. (2022). Prediction of Blood
Screening Parameters for Preliminary Analysis Using Neural Networks. In Predictive
Modeling in Biomedical Data Mining and Analysis (pp. 157–169). Academic Press.
Kataria, A., Puri, V., Pareek, P. K., & Rani, S. (2023, July). Human Activity Classification
Using G-XGB. In 2023 International Conference on Data Science and Network Security
(ICDSNS) (pp. 1–5). IEEE.
Kaur, D., Singh, B., & Rani, S. (2023). Cyber Security in the Metaverse. In Handbook of Research
on AI-Based Technologies and Applications in the Era of the Metaverse (pp. 418–435).
IGI Global.
Bioengineering and Healthcare Data Analysis 25
Kaur, H., & Bhambri, P. (2016). A Prediction Technique in Data Mining for the Diabetes Mel-
litus. Apeejay Journal of Management Sciences and Technology, 4(1), 1–12.
Kaur, R., & Bhambri, P. (2015). Information Retrieval System for Hospital Management.
International Journal of Multidisciplinary Consortium, 2(4), 16–21.
Kim, H. E., & Kim, S. (Eds.). (2019). Bioengineering Applications for Healthcare Technolo‑
gies. CRC Press.
Kumar, P., Banerjee, K., Singhal, N., Kumar, A., Rani, S., Kumar, R., & Lavinia, C. A.
(2022). Verifiable, Secure Mobile Agent Migration in Healthcare Systems Using a
Polynomial-Based Threshold Secret Sharing Scheme with a Blowfish Algorithm. Sen‑
sors, 22(22), 8620.
Lee, J., & Kim, Y. (Eds.). (2018). Healthcare Data Analytics and Management. Springer.
Miller, A. B., & Wilson, C. D. (2017). Genomic Data Privacy Concerns in Biomedical
Research. Annual Review of Genomics and Human Genetics, 18, 139–162.
Nguyen, N. T., & Hui, L. (2018). Data Science and Machine Learning in Biomedical Engi‑
neering. Academic Press.
O’Reilly, U. M., & Smith, J. R. (2021). Introduction to Bioinformatics. CRC Press.
Patel, M., & Chandrasekaran, V. (Eds.). (2020). Emerging Technologies in Healthcare. CRC
Press.
Puri, V., Kataria, A., Rani, S., & Pareek, P. K. (2023, September). DLT Based Smart Medical
Ecosystem. In 2023 International Conference on Network, Multimedia and Information
Technology (NMITCON) (pp. 1–6). IEEE.
Quinlan, R., & Feldman, M. (2017). Bioinformatics for Geneticists. John Wiley & Sons.
Rani, S., Kataria, A., Kumar, S., & Tiwari, P. (2023). Federated Learning for Secure IoMT-
Applications in Smart Healthcare Systems: A Comprehensive Review. Knowl‑
edge-Based Systems, 274, 110658.
Rani, S., Kaur, J., & Bhambri, P. (2023). Technology and Gender Violence: Victimization
Model, Consequences and Measures. In Communication Technology and Gender Vio‑
lence (pp. 1–19). Springer International Publishing.
Rani, S., Kumar, S., Kataria, A., & Min, H. (2023). SmartHealth: An Intelligent Framework
to Secure IoMT Service Applications Using Machine Learning. ICT Express, 48, 1–6.
https://doi.org/10.1016/j.icte.2023.10.001
Rani, S., Mishra, A. K., Kataria, A., Mallik, S., & Qin, H. (2023). Machine Learning-Based
Optimal Crop Selection System in Smart Agriculture. Scientific Reports, 13(1), 15997.
Reddy, M. P., & Raj, A. N. (2019). Advances in Biomedical Informatics: Recent Approaches
and Applications. Academic Press.
Smith, R. D., & Jones, L. M. (2016). Healthcare Data Security and Privacy. Springer.
Tanwar, R., Chhabra, Y., Rattan, P., & Rani, S. (2022, September). Blockchain in IoT Networks
for Precision Agriculture. In International Conference on Innovative Computing and
Communications: Proceedings of ICICC 2022(Vol. 2, pp. 137–147). Springer Nature.
Tondon, N., & Bhambri, P. (2017). Technique for Drug Discovery in Medical Image Pro�-
cessing. International Journal of Advance Research in Science & Engineering, 6(8),
1712–1718.
Turner, K. L., & Miller, C. L. (2018). Biomedical Informatics in Translational Research. Aca-
demic Press.
Wang, L., &Faloutsos, C. (Eds.). (2021). Advances in Healthcare Informatics: A Review.
Springer.
2 Biomedical Engineering
Modelling and
Simulation
Himanshu M. Shukla, Ambarish A. Deshpande,
Kanchan D. Ganvir, and Jignyasa Gandhi
2.1 INTRODUCTION
The variability in respiratory tract anatomy and physiology among individuals sig-
nificantly influences aerosol deposition patterns. Factors such as airway branching
structure, airway diameter, lung volume, and mucociliary clearance affect the fate of
inhaled particles in the respiratory system. Individual variations in these parameters
arise due to differences in age, gender, weight, fitness, health, and disease status. It
is crucial to consider these variabilities to accurately predict aerosol deposition and
assess the efficacy of inhaled therapeutics (Kannan et al., 2020).
respiratory, nervous, etc.), biomechanics, biofluid dynamics, and drug delivery sys-
tems (Singh et al., 2005). The chapter explores how computational models and sim-
ulations can aid in understanding the behavior of these complex systems, predicting
their responses, and optimizing their performance.
2.3 RELATED LITERATURE
Osteoporotic fractures impose a significant burden on public health, resulting
in an annual cost of €37 billion in the EU and $16 billion in the United States.
Specifically, hip fractures occur when the forces applied to the hip during a fall
surpass its ability to bear the load, leading to structural failure. The strength of
the hip depends on factors such as the shape of the femur, bone mineral density
(BMD), and bone architecture. Conversely, the impact experienced during a fall is
influenced by various elements, including the dynamics of the fall, the individual’s
body size and shape, as well as the stiffness of the hip, the surrounding tissues, and
the flooring. However, the precise relationship between hip strength, fall dynam-
ics, and osteoporotic hip fractures remains uncertain. The risk of osteoporotic hip
fracture in a sideways fall depends on both body anthropometry and bone strength
(Palanca et al., 2021).
The complexities of modern biomedicine are continuously on the rise, making
modelling and simulation increasingly essential for understanding and predicting
pathophysiology, disease genesis, and disease spread. These tools support clinical
and policy decisions, but their outcomes must be trusted cautiously, as inappropriate
reliance on them can lead to negative consequences. To ensure a formalized approach
to modelling and simulation practices, it is crucial to consider more than just verifi-
cation and validation, as they alone do not guarantee a holistic credible practice. The
declared rules offer a unified conceptual framework to guide modelling and simula-
tion activities throughout their lifecycle, including design, implementation, evalua-
tion, dissemination, and usage (Erdemir et al., 2020). While different domains, such
as biomedical science and clinical care, may have varying requirements, our study
has identified rules that can be universally valuable for a wide range of model types.
Though some of these rules may seem like common sense guidelines, experienced
practitioners sometimes overlook or misunderstand them. Computational models are
already proving valuable in basic science, generating new biomedical knowledge. As
they continue to be incorporated into clinical care and healthcare policy, it becomes
imperative to establish guidelines for credible practice to ensure clinical safety and
foster advancements in personalized and precision medicine.
Creating tools for predicting human limb force capabilities using the force feasi-
ble set (FFS) holds significant promise for applications in robotic-assisted rehabili-
tation and digital human modelling for ergonomics (Hernandez et al., 2018). These
predictions could play a crucial role in refining rehabilitation programs to encourage
active participation during exercise therapy and in preventing musculoskeletal dis-
orders. The main objective of this research is to utilize artificial neural networks
(ANN) to forecast the FFS of the upper limb, based on joint center Cartesian posi-
tions and anthropometric data. To achieve this, 17 distinct musculoskeletal models of
the right upper limb are generated, each tailored to individual anthropometric data.
The FFS is then computed for a vast range of 8428 different postures within each
Biomedical Engineering Modelling and Simulation 29
musculoskeletal model. The results demonstrate that ANNs offer a reliable method
for predicting the FFS in the context of studying the human musculoskeletal system.
Moreover, even with an increasing complexity of FFS vertices, the ANN’s capacity
to predict these values remains unchanged. Additionally, the approach exhibits min-
imal computation time and exhibits good generalization performance, suggesting its
potential use with real-time feedback to assess human gesture and hand force control
during demanding tasks.
The field of engineering has undergone significant transformation in the mod-
ern era, moving beyond traditional reliance on physical testing to a more powerful
approach that combines theory with real-world testing. This fusion has resulted in
enhanced product designs and a deeper understanding of relevant phenomena, which
are now captured in computer-aided engineering systems, enabling model-driven
experimentation. The integration of computational modelling and simulation
(CM&S) has played a crucial role in shaping the complexity and reliability of mod-
ern machines, effectively replacing physical testing as the primary tool for guiding
designs (Morrison et al., 2023).
Biomedical engineers face distinctive challenges as they strive to achieve a similar
level of behavioral understanding to embrace CM&S as a reliable guide. Modelling
biological systems proves difficult to validate in realistic environments due to vari-
ations across populations and changes over time. Consequently, the potential of
CM&S in the biomedical field remains largely untapped. However, the biomedical
engineering community has consistently pushed the boundaries of CM&S over the
last five decades, chronicling their progress in the AMBE journals.
A smart chair prototype was developed to address the issue of poor sitting pos-
tures during extended periods (Martins et al., 2016). The chair incorporated a pneu-
matic system with four air bladders in the seat pad and four in the backrest, allowing
it to recognize and classify 12 standardized sitting postures with an accuracy score
of 80.9%. This study seeks to explore the potential of anthropometric information
(height and weight) to further refine the classification process. Four machine learn-
ing techniques (neural networks, support vector machines, classification trees, and
naïve Bayes) were employed to automatically divide users into two classes based on
whether they were above or below the specific anthropometric median value.
The clothing sizing system remains a persistent challenge, necessitating further
research and improvements in sizing system standards, body measuring techniques,
and size labelling in collaboration with clothing manufacturers, consumers, and
researchers (Lee, 2014). Developing a comprehensive sizing system that consid-
ers human body growth and other relevant factors will help eliminate the existing
confusion among countries and individual apparel designers. In current production
processes, standardization plays a crucial role in promoting international trade by
reducing differences and disorder, ensuring product quality, enhancing production
efficiency, and facilitating rapid improvements. It also facilitates expansion and
makes the implementation of practices more convenient and comfortable (Puri et al.,
2023, September).
An effective standard sizing system for clothes is established through a body
shape and size classification method. To create such a system, it is essential to clas-
sify the database based on the majority of samples. By doing so, we can develop a
30 Computational Intelligence in Biomedical and Health Informatics
sizing system that efficiently accommodates a wide range of body shapes and sizes.
The findings are organized into body size and shape categories, considering age and
sex and using drop values. This classification is crucial as it forms the basis for devel-
oping new guidelines for size designation systems. These guidelines will be derived
from the analyzed anthropometric database, incorporating the relevant body dimen-
sions to ensure accurate and appropriate sizing in clothing (Kataria et al., 2023, July).
Significant variations were observed in the distributions of sex and age between
the populations used to collect biomechanical data for the human neck and those with
neck injuries. In contrast, smaller differences were noted in the height, weight, and
BMI distributions between these two groups (Booth et al., 2021). The study’s overall
findings highlight the need for more biomechanical data, especially for females of
average height and weight. Additionally, the research shows a lack of biomechanical
data for older volunteers, young cadavers, and volunteers with high BMIs, regard-
less of sex. As a general recommendation, the study urges researchers to consider
the diversity of the population prone to neck injuries when enrolling volunteers and
cadavers for biomechanical studies. By including a more representative sample of
the population, the accuracy and applicability of the research findings can be signifi-
cantly enhanced.
The study discusses issues related to modelling various muscles, including stri-
ated and smooth muscles such as those in the bladder and uterus, apart from the
cardiac muscle (Hernández et al., 2013). The study is also oriented toward multiscale
modelling, encompassing cellular to subcellular levels. The main interest revolves
around applying modelling tools to solve real clinical health problems, utilizing a
model-aided diagnosis approach. The aim is also to enhance the acceptance of mod-
elling within the industrial community. By fostering these collaborations and ini-
tiatives, the researcher aims to advance the field of physiological modelling and its
practical applications.
The future of human body testing in military and civilian applications will rely
on a new generation of “dummies”—what we call “virtual humans.” CFDRC’s CMB
(computational medicine and biology) research group has developed an integrated
bioinformatics software framework for intelligent analysis of biomedical databases
(Wilkerson et al., 2009). This framework facilitates the generation of geometri-
cal models for simulations and aids in setting up human biomechanical and phys-
iological performance models. The software framework is a 3D Java-based, fully
user-interactive Virtual Body platform. It allows for the creation and editing of vir-
tual human bodies and serves as a front end for multiscale anthropometry/anatomy
physics-based simulation software. The software enables the generation and manip-
ulation of static and dynamic human body models using laser scans, anthropometric
databases, and other image-based anatomical techniques like motion capture (Rani,
Mishra, et al., 2023). Additionally, the Virtual Body serves as a data generator and
preprocessor for various human body simulation software, such as biomechanics,
ergonomics, cardiopulmonary physiology, blast injury, and other simulators. This
integration streamlines the process of predictive modelling for human body perfor-
mance in different scenarios, aiding in the development of safer and more efficient
military and civilian applications.
Biomedical Engineering Modelling and Simulation 31
the apparel industry. Online retailers can utilize these measurements to offer per-
sonalized sizing recommendations to customers, reducing the rate of returns and
enhancing customer satisfaction.
FIGURE 2.1 Anthropometric dimensions (standing and sitting positions) (Zanwar et al., 2023).
36 Computational Intelligence in Biomedical and Health Informatics
REFERENCES
Booth, G. R., Cripton, P. A., & Siegmund, G. P. (2021). The lack of sex, age, and anthropomet-
ric diversity in neck biomechanical data. Frontiers in Bioengineering and Biotechnol‑
ogy, 9, 684217. https://doi.org/10.3389/fbioe.2021.684217
Erdemir, A., Mulugeta, L., Ku, J. P., Drach, A., Horner, M., Morrison, T. M., Peng, G. C. Y.,
Vadigepalli, R., Lytton, W. W., & Myers, J. G. (2020). Credible practice of modeling
and simulation in healthcare: Ten rules from a multidisciplinary perspective. Journal of
Translational Medicine, 18(1), 369. https://doi.org/10.1186/s12967-020-02540-4
Biomedical Engineering Modelling and Simulation 37
Hernández, A.-I., Marque, C.-K., Beurton-Aimar, M., & Ribba, B. (2013). Theme A: Mode�-
ling and simulation in biomedical research. Results and future works. IRBM, 34(1), 3–5.
https://doi.org/10.1016/j.irbm.2012.12.019
Hernandez, V., Rezzoug, N., Gorce, P., & Venture, G. (2018). Force feasible set prediction with
artificial neural network and musculoskeletal model. Computer Methods in Biomechan‑
ics and Biomedical Engineering, 21(14), 740–749. https://doi.org/10.1080/10255842.2
018.1516763
Jain, V. K., & Bhambri, P. (2005). Fundamentals of Information Technology & Computer Pro‑
gramming. Katson.
Kannan, R., Chen, Z., Przekwas, A., Segars, P., Martin, F., Kuczaj, A. K., & Hoeng, J. (2020).
Anthropometry‐based generation of personalized and population‐specific human air-
way models. International Journal for Numerical Methods in Biomedical Engineering,
36(5). https://doi.org/10.1002/cnm.3324
Kataria, A., Puri, V., Pareek, P. K., & Rani, S. (2023, July). Human activity classification
using G-XGB. In 2023 International Conference on Data Science and Network Security
(ICDSNS) (pp. 1–5). IEEE.
Kaur, D., Singh, B., & Rani, S. (2023). Cyber security in the metaverse. In Handbook of Research
on AI-Based Technologies and Applications in the Era of the Metaverse (pp. 418–435).
IGI Global.
Lee, Y.-S. (2014). Standards sizing for clothing based on anthropometry data. Journal of the Ergo‑
nomics Society of Korea, 33(5), 337–354. https://doi.org/10.5143/JESK.2014.33.5.337
Martins, L., Ribeiro, B., Almeida, R., Pereira, H., Jesus, A., Quaresma, C., & Vieira, P. (2016).
Optimization of sitting posture classification based on anthropometric data. Proceedings
of the 9th International Joint Conference on Biomedical Engineering Systems and Tech‑
nologies, 406–413. https://doi.org/10.5220/0005790104060413
Morrison, T. M., Stitzel, J. D., & Levine, S. M. (2023). Modeling and simulation in biomedical
engineering: Regulatory science and innovation for advancing public health. Annals of
Biomedical Engineering, 51(1), 1–5. https://doi.org/10.1007/s10439-022-03116-7
Palanca, M., Perilli, E., & Martelli, S. (2021). Body anthropometry and bone strength con�-
jointly determine the risk of hip fracture in a sideways fall. Annals of Biomedical Engi‑
neering, 49(5), 1380–1390. https://doi.org/10.1007/s10439-020-02682-y
Puri, V., Kataria, A., Rani, S., & Pareek, P. K. (2023, September). DLT based smart medical
ecosystem. In 2023 International Conference on Network, Multimedia and Information
Technology (NMITCON) (pp. 1–6). IEEE.
Rani, S., Kumar, S., Kataria, A., & Min, H. (2023). SmartHealth: An intelligent framework to
secure IoMT service applications using machine learning. ICT Express, 48, 1–6.
Rani, S., Mishra, A. K., Kataria, A., Mallik, S., & Qin, H. (2023). Machine learning-based
optimal crop selection system in smart agriculture. Scientific Reports, 13(1), 15997.
Rattan, M., Bhambri, P., & Shaifali. (2005a, February). Information Retrieval Using Soft Com‑
puting Techniques. Paper presented at the National Conference on Bio-Informatics Com-
puting, 7.
Rattan, M., Bhambri, P., & Shaifali. (2005b, February). Institution for a Sustainable Civiliza‑
tion: Negotiating Change in a Technological Culture. Paper presented at the National
Conference on Technical Education in Globalized Environment-Knowledge, Technol-
ogy & The Teacher, 45.
Singh, P., Singh, M., & Bhambri, P. (2004, November). Interoperability: A Problem of Com‑
ponent Reusability. Paper presented at the International Conference on Emerging Tech-
nologies in IT Industry, 60.
Singh, P., Singh, M., & Bhambri, P. (2005, January). Embedded Systems. Paper presented at
the Seminar on Embedded Systems, 9–15.
Wilkerson, P., & Przekwas, A. (2007). Integrated Modeling Framework for Anthropometry and
Physiology Virtual Body. SAE International.
38 Computational Intelligence in Biomedical and Health Informatics
Wilkerson, P., Zhou, X., Przekwas, A., Buhrman, J., & Cheng, H. (2009). Virtual Body
Generator for Anthropometry and Physiology Based Modeling (Technical Paper 2009-
01-2280). SAE International. https://doi.org/10.4271/2009-01-2280
Zanwar, D. R., Zanwar, H. D., Shukla, H. M., & Deshpande, A. A. (2023). Prediction of anthro-
pometric dimensions using multiple linear regression and artificial neural network mod-
els. Journal of The Institution of Engineers (India): Series C, 104(2), 307–314. https://
doi.org/10.1007/s40032-022-00904-x
Ziolek, S. A., & Kruithof, P. C. (2000). Human modeling &simulation: A primer for practi-
tioners. Proceedings of the Human Factors and Ergonomics Society Annual Meeting,
44(38), 825–827. https://doi.org/10.1177/154193120004403839
3 Information Extraction
and Knowledge
Discovery in Biomedical
Engineering and
Health Informatics
S. Archana and E. Mathiselvan
DOI: 10.1201/9781003459347-3 39
40 Computational Intelligence in Biomedical and Health Informatics
Text mining techniques are critical for extracting meaningful information from large
volumes of biomedical texts, providing important insights for research and therapeu-
tic applications. Figure 3.1 shows some of the strategies.
themes for each document and weigh how well the documents fit into each
cluster (Tanwar et al., 2022, September).
The quality of a clustering result is governed by the similarity measures of text
content used by the clustering technique and its implementation, so a suc-
cessful clustering strategy provides clusters with high intracluster similar-
ity and low intercluster similarity. It differs from categorization in that text
contents are clustered without prior knowledge of classifications in clustering
(Bhambri & Bhandari, 2005). The main advantage of clustering is that text
content can be relevant to multiple classes at the same time. Many clustering
algorithms, including hierarchical, distribution, density centroid, and k-means
clustering, are used to analyze unstructured text data (Kaur et al., 2023).
Categorization: The categorization approach assigns one or more categories
to independent (free format) text documents. Categorization is a supervised
learning strategy that uses input–output examples to differentiate new mate-
rial. Each text document is allocated a specified class based on its content.
Text categorization involves methods like preprocessing, indexing, dimen-
sionality reduction, and classification with the goal of training classifiers
on recognized examples and then automatically categorizing unrecog-
nized examples. Furthermore, text categorization is hampered by the great
dimensionality of the feature space. Then naïve Bayesian classifiers, nearest
neighbor classifiers, decision trees, and support vector machines are some
effective analytical classification methods for text categorization. Document
organization, spam screening, SMS classification, and hierarchical web
page categorization are all applications included in categorization.
Visualization: Visualization tools can aid in the improvement and clarification
of data analysis. When outlining individual documents or groups of docu-
ments, text flags are used to indicate the type of the documents, and colors
are used to indicate document density. Large textual sources are organized
in a visual hierarchy, allowing users to interact with them by diving and
zooming. The government, for example, uses information visualization to
identify terrorist networks and criminal information.
Preparation of Data: This requires determining and obtaining unique data for
visualization, as well as creating unique data space.
Data Extraction and Analysis: Data analysis and extraction refers to the pro-
cess of examining and extracting visualization data from original data in
order to construct a visualization data space.
Visualization Mapping: Some mapping approaches are employed in this step
to map the visualization data space to the visualization goal (Rani, Mishra,
et al., 2023).
Text Summarization: This aids in determining whether a lengthy document
meets the user’s requirements and also in determining whether it is worth-
while reading for additional information or not. Thus text summarization
could be replaced by groups of documents.
44 Computational Intelligence in Biomedical and Health Informatics
Named entity recognition (NER) is explored as a key technique for identifying and
extracting important biomedical entities, including genes, proteins, diseases, and
drugs. Relation extraction methods are discussed to uncover meaningful relationships
between these entities, further enriching the extracted knowledge. Additionally, text
classification techniques are introduced, enabling the categorization and organiza-
tion of biomedical documents based on their content and relevance.
Application: Its ability to turn text into structured data allows for a better
understanding of molecular relationships, disease causes, and prospective
Information Extraction and Knowledge Discovery 45
similar data points and categorizing biomedical data into understandable classifica-
tions. These approaches are especially useful in disease diagnosis and patient strati-
fication based on molecular profiles.
Furthermore, we investigate predictive modeling and decision support systems
that use machine learning to forecast disease outcomes and assist doctors in making
well-informed treatment decisions. The potential of machine learning algorithms
in finding illness biomarkers and therapeutic targets emphasizes the importance of
this field.
This topic goes into clustering and classification methods, both of which are critical com-
ponents of biomedical data processing. Clustering algorithms use similarity measures
to group similar data points together, allowing researchers to uncover patterns and sub-
groups within the data. (Forkan et al., 2020). Clustering can help discover patient subpop-
ulations withcomparableillnessfeaturesortreatmentresponsesinthebiomedicalarea.
Classification algorithms, on the other hand, use features to assign data points to
predetermined groupings or categories. This type of algorithm is commonly used in
illness diagnostics, where the model learns from labelled data to predict disease out-
comes or patient states. Biomedical researchers get deeper insights into complicated
information by using clustering and classification approaches, enabling personalized
therapy, disease stratification, and treatment optimization.
using machine learning algorithms to estimate patient outcomes, identify early indi-
cators of disease, and predict therapy responses. These models use previous patient
data to build connections between clinical characteristics and illness outcomes, pro-
viding tailored and preventative healthcare (Bhagya & Sripriya, 2022). Clinicians
can utilize predictive models to aid in the early diagnosis of diseases, the selection
of effective treatment techniques, and the customization of healthcare plans based on
unique patient characteristics. Finally, predictive modeling employing EHR data pro-
vides healthcare professionals with useful insights to give more efficient and targeted
care, improving patient outcomes, and altering the healthcare delivery environment.
guarantees that data privacy is consistently protected when data is shared across
businesses.
Researchers in biological data mining can protect patient privacy while promot-
ing knowledge discovery and healthcare research by using effective de-identification
techniques, stringent security measures, and clear data sharing protocols. Protecting
privacy and security is critical for fostering public trust, promoting appropriate
research practices, and realizing the full potential of biological data to enhance
healthcare outcomes.
knowledge discovery. The combination of existing trends and future discoveries holds
the key to changing medicine and improving patient outcomes on a global scale.
3.7 CONCLUSION
In this chapter, we discovered their enormous potential of information extraction and
knowledge discovery to improve healthcare. Information extraction converts unstruc-
tured data into organized insights, increasing accessibility and enabling new applications.
Meanwhile, knowledge discovery identifies critical patterns in biomedical data-
sets, improving precision healthcare and drug development. Wearable devices,
explainable AI, and the integration of omics data are among the intriguing future
prospects. While tackling issues such as data privacy and scalability responsibly,
these strategies enable researchers and clinicians to accelerate medical discoveries
and deliver tailored healthcare solutions, thereby defining a healthier tomorrow.
REFERENCES
Alam, T.M., & Awan, M.J. (2018). Domain analysis of information extraction techniques.
International Journal of Multidisciplinary Sciences and Engineering, 9(6).
Anthony, D. L., Appari, A., & Johnson, M. E. (2014). Institutionalizing HIPAA compliance:
Organizations and competing logics in US health care. Journal of Health and Social
Behavior, 55(1), 108–124.
Bhagya, A., & Sripriya, P. (2022, March). Predictive analysis in academic: An insight to chal-
lenges and techniques. In 20226th International Conference on Computing Methodolo‑
gies and Communication (ICCMC) (pp. 1474–1483). IEEE.
Bhambri, P., & Bhandari, A. (2005, March). Different Protocols for Wireless Security. Paper
presented at the National Conference on Advancements in Modeling and Simulation, 8.
Bhambri, P., & Gupta, S. (2005, March). A Survey & Comparison of Permutation Possibility
of Fault Tolerant Multistage Interconnection Networks. Paper presented at the National
Conference on Application of Mathematics in Engineering & Technology, 13.
Bhambri, P., & Mangat, A. S. (2005, March). Wireless Security. Paper presented at the National
Conference on Emerging Computing Technologies, 155–161.
Bhambri, P., & Singh, I. (2005, March). Electrical Actuation Systems. Paper presented at the
National Conference on Application of Mathematics in Engineering & Technology,
58–60.
Bhambri, P., Singh, I., & Gupta, S. (2005, March). Robotics Systems. Paper presented at the
National Conference on Emerging Computing Technologies, 27.
Chen, X., Xie, H., Cheng, G., Poon, L. K., Leng, M., & Wang, F. L. (2020). Trends and fea�-
tures of the applications of natural language processing techniques for clinical trials text
analysis. Applied Sciences, 10(6), 2157.
Desai, A. (2015). Are view on knowledge discovery using text classification techniques in text
mining. International Journal of Computer Applications, 111(6).
Forkan, A.R.M., Khalil, I., & Kumarage, H. (2020). Patient clustering using dynamic parti-
tioning on correlated and uncertain biomedical data. Computer Methods and Programs
in Biomedicine, 190, 105483.
Hersh, W. (2008). Information Retrieval: A Health and Biomedical Perspective. Springer Sci-
ence & Business Media.
Hossain, M.E., Khan, A., Moni, M. A., & Uddin, S. (2019). Use of electronic health data
for disease prediction: A comprehensive literature review. IEEE/ACM Transactions on
Computational Biology and Bioinformatics, 18(2), 745–758.
54 Computational Intelligence in Biomedical and Health Informatics
Kataria, A., Puri, V., Pareek, P.K., & Rani, S. (2023, July). Human activity classification using
G-XGB. In 2023 International Conference on Data Science and Network Security
(ICDSNS) (pp. 1–5). IEEE.
Kaur, D., Singh, B., & Rani, S. (2023). Cyber security in the metaverse. In Handbook of Research
on AI-Based Technologies and Applications in the Era of the Metaverse (pp. 418–435).
IGI Global.
Mahoto, N.A., Shaikh, A., Al Reshan, M.S., Memon, M.A., & Sulaiman, A. (2021). Knowl-
edge discovery from healthcare electronic records for sustainable environment. Sustain‑
ability, 13(16), 8900.
Mooney, R.J., & Bunescu, R. (2005). Mining knowledge from text using information extrac-
tion. ACM SIGKDD Explorations Newsletter, 7(1), 3–10.
Pramod, D. (2023). Privacy-preserving techniques in recommender systems: State-of-the-art
review and future research agenda. Data Technologies and Applications, 57(1), 32–55.
Preeti. (2021, December). Review on text mining: Techniques, applications and issues. In 2021
10th International Conference on System Modeling & Advancement in Research Trends
(SMART) (pp. 474–478). IEEE.
Rani, S., Kumar, S., Kataria, A., & Min, H. (2023). SmartHealth: An intelligent framework to
secure IoMT service applications using machine learning. ICT Express, 48, 1–6.
Rani, S., Mishra, A. K., Kataria, A., Mallik, S., & Qin, H. (2023). Machine learning-based
optimal crop selection system in smart agriculture. Scientific Reports, 13(1), 15997.
Tanwar, R., Chhabra, Y., Rattan, P., & Rani, S. (2022, September). Blockchain in IoT networks
for precision agriculture. In International Conference on Innovative Computing and
Communications: Proceedings of ICICC 2022 (Vol. 2, pp. 137–147). Springer Nature.
4 Applications and
Distributed Frameworks
Security Issues
G. Adiline Macriga and S. Sankari
4.1 DISTRIBUTED FRAMEWORKS
Distributed frameworks are software frameworks that allow the execution of par-
allel and distributed computing tasks across multiple machines or nodes in a net-
work. These frameworks provide abstractions and tools to simplify the development,
deployment, and management of distributed applications.
DOI: 10.1201/9781003459347-4 55
56 Computational Intelligence in Biomedical and Health Informatics
healthcare stakeholders. Here are some key health and medical applications of dis-
tributed frameworks:
4.5 CONCLUSION
Distributed frameworks offer a powerful and scalable approach (Ousterhout
et al., 2011) to building complex systems that leverage the capabilities of multiple
nodes or participants. They enable decentralized architectures, fault tolerance, and
improved performance, making them suitable for various applications. However,
implementing and managing distributed frameworks come with their own set of chal-
lenges, particularly in terms of security, scalability, and interoperability. To address
64 Computational Intelligence in Biomedical and Health Informatics
these challenges, organizations should focus on key areas such as ensuring the secu-
rity of the framework through vulnerability assessments, code audits, and adherence
to secure development practices. Scalability can be achieved through techniques like
load balancing, partitioning, and optimizing resource utilization. Interoperability
can be enhanced by using standard protocols and APIs, adopting common data for-
mats, and leveraging integration patterns.
Distributed frameworks offer numerous opportunities across various domains,
including decentralized finance (DeFi), supply chain management, healthcare, and
Internet of Things (IoT) (Peter et al., 2017). They enable the development of applica-
tions that can revolutionize industries, provide enhanced privacy, improve efficiency,
and increase transparency. However, organizations must also be mindful of the
challenges and risks associated with distributed frameworks. These include security
vulnerabilities, privacy concerns, regulatory compliance, governance issues, and the
need for continuous monitoring and updates. In conclusion, distributed frameworks
have the potential to transform how applications are built and deployed, offering
scalability, fault tolerance, and decentralized architectures. By addressing security,
scalability, and interoperability challenges, organizations can leverage the benefits
of distributed frameworks to develop innovative and robust systems that drive effi-
ciency, trust, and value in a wide range of industries.
REFERENCES
Abrol, N., Shaifali, Rattan, M., & Bhambri, P. (2005). Implementation and performance eval‑
uation of JPEG 2000 for medical images. International Conference on Innovative Appli-
cations of Information Technology for Developing World.
Bhambri, P., & Sharma, N. (2005, September). Priorities for sustainable civilization.
Paper presented at the National Conference on Technical Education in Globalized
Environment-Knowledge, Technology & The Teacher, p. 108.
Bhambri, P., & Singh, M. (2005). Artificial intelligence. Seminar on E-Governance, Pathway
to Progress, p. 14.
Bhambri, P., Sood, G., & Verma, A. (2005). Robotics design: Major considerations. National
Conference on Emerging Computing Technologies, p. 100.
Castro, M., & Liskov, B. (1999). Practical byzantine fault tolerance. Proceedings of the Third
Symposium on Operating Systems Design and Implementation (OSDI).
Kataria, A., Puri, V., Pareek, P. K., & Rani, S. (2023, July). Human activity classification
using G-XGB.2023 International Conference on Data Science and Network Security
(ICDSNS), IEEE, pp. 1–5.
Kaur, D., Singh, B., & Rani, S. (2023). Cyber security in the metaverse. In Handbook of
research on AI-based technologies and applications in the era of the metaverse. IGI
Global, pp. 418–435.
Kulkarni, S. et al. (2015). Twitter heron: Stream processing at scale. Proceedings of the 2015
ACM SIGMOD International Conference on Management of Data.
Lamport, L., Shostak, R., & Pease, M. (1982). The byzantine generals problem. ACM Trans‑
actions on Programming Languages and Systems, 4(3).
Liu, H. H. et al. (2018). BigDL: A distributed deep learning framework for big data. Proceed-
ings of the 2018 ACM SIGMOD International Conference on Management of Data.
Ousterhout, K. et al. (2011). The case for RAMClouds: Scalable high-performance storage
entirely in DRAM. Proceedings of the 23rd ACM Symposium on Operating Systems
Principles (SOSP).
Distributed Frameworks 65
Peter, L. et al. (2017). Safe and efficient fine-grained data access control for IoT systems.
Proceedings of the 2017 IEEE International Conference on Cloud Engineering (IC2E).
Puri, V., Kataria, A., Rani, S., & Pareek, P. K. (2023, September). DLT based smart medical
ecosystem. 2023 International Conference on Network, Multimedia and Information
Technology (NMITCON), IEEE, pp. 1–6.
Rani, S., Mishra, A. K., Kataria, A., Mallik, S., & Qin, H. (2023). Machine learning-based
optimal crop selection system in smart agriculture. Scientific Reports, 13(1), 15997.
Rani, S., Kumar, S., Kataria, A., & Min, H. (2023). SmartHealth: An intelligent framework to
secure IoMT service applications using machine learning. ICT Express, 48, 1–6.
Singh, M., Singh, P., Kaur, K., & Bhambri, P. (2005, March). Database security. Paper
presented at the National Conference on Future Trends in Information Technology,
pp. 57–62.
Zaharia, M. et al. (2012). Resilient distributed datasets: A fault-tolerant abstraction for
in-memory cluster computing. Proceedings of the 9th USENIX Conference on Net-
worked Systems Design and Implementation (NSDI).
Zaharia, M. et al. (2016). Apache Spark: A unified computing engine for big data processing.
Communications of the ACM, 59(11).
5 Blockchain Technology
Framework
Issues and Future
Challenges
Shital Sharma and Palvinder Singh Mann
5.1 INTRODUCTION
Blockchain technology revolutionizes transaction and data management through
its decentralized, unchangeable digital ledger. This immutable ledger, composed of
blocks, is maintained chronologically and securely by a network of nodes. Unlike
centralized systems, blockchain ensures transparency, trust, and security without
intermediaries like banks. Each block contains linked transactions, secured by cryp-
tography to prevent tampering. This linking makes altering previous transactions
extremely challenging, necessitating consensus across the network. Blockchain con-
sensus methods include proof-of-work (PoW), using processing power, and proof-of-
stake (PoS), relying on users’ coin stakes for block validation and network protection.
5.1.1 Background
In the evolution of blockchain, Bitcoin, originating from 2008, fused the 1991 concept
of a secure chain of information with digital signatures used for document integrity
(Rani, Kumar, et al., 2023). The 2008 paper “Bitcoin: A Peer to Peer Electronic Cash
System” by pseudonymous Satoshi Nakamoto brought these ideas together, birthing
the Bitcoin blockchain in 2009. Then, in 2013, Ethereum introduced a new public
blockchain, gaining remarkable popularity since its full launch in 2015. Extensive
research yielded tamper-resistant digital ledgers, eliminating the need for central
control. These ledgers enable collective transaction recording, ensuring immuta-
bility. Blocks contain signed transactions, validated through consensus and linked
tamper-resistant (Kataria et al., 2023). Security grows as new blocks join. Copies
of the ledger stay updated, with protocols addressing discrepancies automatically
(Kramer, 2019).
5.1.2 Blockchain Architecture
Blockchain is a system of interconnected records that are highly resistant to
changes, secured by cryptography, and constructed with distributed processing
and durability. Figure 5.1 shows that the multilayer framework for the operation
of a blockchain network can be visualized as a multilayered architecture (Puri
et al., 2023, September).
5.1.3 Organization of Chapter
This chapter is divided into various sections; Section 5.2 describes blockchain
frameworks and challenges of blockchain frameworks. Section 5.3 explains the
challenges for blockchain framework. Section 5.4 discusses the issues and its rele-
vant solutions in blockchain framework. We conclude this chapter with some future
issues.
This study examines blockchain frameworks, analyzing their architecture, empha-
sizing operational layers. Valuable for blockchain professionals, it aids in strategic
framework selection by imparting insight into properties, scalability, and perfor-
mance. Advancing industry understanding, it sheds light on blockchain’s implica-
tions across sectors.
5.2 BLOCKCHAIN FRAMEWORKS
Blockchain frameworks are decentralized systems that use cryptography to securely
record transactions across a computer network. They form chains of chronological
blocks, like Ethereum for smart contracts and Hyperledger Fabric for enterprise
needs. These frameworks ensure tamper-resistant, auditable, and efficient systems,
fostering trust and reducing reliance on central authorities (Quasim et al., 2020).
5.2.2.1 Bitcoin
Launched in 2009 by Satoshi Nakamoto, Bitcoin is the pioneering decentralized
cryptocurrency and blockchain, shaping today’s crypto landscape. Operating on a
decentralized network, it ensures secure, intermediary-free transactions through
its proof-of-work consensus upheld by miners. With a fixed supply of 21 million
coins, it offers deflationary traits yet faces challenges like limited throughput
and high energy usage. Despite this, Bitcoin’s resilience has sparked alternative
Blockchain Technology Framework 69
blockchain systems aiming to surpass its limits, driven by scalability and enhanced
functionality, while recognizing its enduring status and network effects (Smetanin
et al., 2020).
5.2.2.2 Ethereum
5.2.2.2.1 Smart Contracts and Decentralized Applications (DApps)
A smart contract is a computer language for automating processes, conceived by
Nick Szabo. It defines obligations with conditions and logic (Lu, 2019). When condi-
tions are met, it activates automatically, serving as an assurance plan, enhancing data
processing, security, and transactions. Private blockchain (Wang et al., 2019) Hawk
uses smart contracts for secure transactions. Ethereum integrates them into DApps,
combining fast code creation with security for decentralized app development (Taş &
Tanrıöver, 2019).
Ethereum Proof of work Solidity (EVM) Limited ~15 (varies with Decentralized Decentralized applications
upgrades) (DApps), DeFi
Hyperledger Fabric Pluggable Chain code (Go, Yes (Channels) Up to thousands Permissioned Enterprise solutions, supply
Java) chain
Corda Pluggable Kotlin (Corda) Yes (states) Hundreds Permissioned Financial services,
inter-organizational
EOSIO Delegated proof-of-stake Web Assembly No Thousands Decentralized DApps, social media,
(DPoS) (C++, Rust) supply chain
Tezos Liquid proof-of-stake Michelson Yes (ZK-SNARKs) ~Zhang (varies with Decentralized Governance, smart
(LPoS) upgrades) contracts, DApps
Stellar Federated Byzantine Stellar Consensus Yes (Encryption) Thousands (low Decentralized Cross-border payments,
Agreement (FBA) Protocol (SCP) latency) tokenization
Quorum Majority voting Solidity (EVM) Limited ~100 Permissioned Financial applications,
private transactions
TRON Delegated proof of stake Solidity (EVM) No ~2,000 Decentralized Gaming, DApps,
(DPoS) entertainment
IOTA Tangle Wasm (Rust) Yes (Masked Scalable Decentralized IoT, supply chain,
Authenticated micropayments
Messaging)
R3 Corda Pluggable Kotlin (Corda) Yes (States) Hundreds Permissioned Financial services, supply
chain
71
72 Computational Intelligence in Biomedical and Health Informatics
TABLE 5.2
Review of Blockchain Frameworks Features
Sr. No. Framework Review and Analysis
Ethereum Smart contracts, decentralized apps Moderate transactions per Limited scalability due to Relatively secure, but vulnerable to certain attacks,
(DApps), tokenization second (TPS) proof-of-work (PoW) consensus e.g., 51% attack
Hyperledger Modular architecture, private High TPS, supports parallel Scales well in private network High security, support for permissioned networks,
Fabric channels, chaincode support execution of transactions settings pluggable consensus mechanisms
Corda Smart contracts (CorDapps), High TPS in private Scales well in permissioned Emphasizes privacy, with transactions only shared
privacy support network settings network settings with relevant parties
EOS Delegated proof of stake (DPoS) Very high TPS, capable of Horizontal scaling through Improved security compared to PoW, but DPoS
consensus, smart contracts thousands of transactions parallel processing introduces certain centralization concerns
per second
Stellar Fast and low-cost transactions, Moderate TPS, settles Hierarchical consensus model, Focus on security, distributed trust through
multicurrency support transactions in 2–5 scalable with fewer nodes consensus and federated Byzantine agreement
seconds
Quorum Privacy features (transaction and Moderate to high TPS Scales well in consortium settings Enhanced security with privacy features, based on
contract privacy) Ethereum but with added enterprise focus
IOTA Tangle DAG structure, feeless Scalability increases with Scales well due to Tangle Focus on security, quantum-resistant cryptography,
transactions network size structure but some concerns have been raised
Polkadot Interoperability, shared security High TPS with multiple High scalability with shared Enhanced security, supports various consensus
(parachains) parallel chains security mechanisms and customizable blockchains
Cardano Peer-reviewed development, Moderate TPS with the Designed for scalability and Strong focus on security, rigorous development
Sustainability features possibility of improvement future growth process, aiming to be a secure PoS blockchain
Tezos Self-amending mechanism, Moderate TPS Scales well with a flexible, Emphasis on security and long-term upgradability,
on-chain governance self-amending protocol on-chain governance helps address issues
73
74 Computational Intelligence in Biomedical and Health Informatics
consensus mechanism, driving the search for greener alternatives like proof-
of-stake (PoS) to address environmental and financial concerns.
Complexity: Blockchain technology may be complicated and difficult to
grasp, making it difficult for developers and consumers to collaborate. This
may hinder blockchain technology adoption in some businesses.
Legal and Regulatory Challenges: Worldwide, blockchain technology
confronts legal and regulatory difficulties. To enable widespread use of
blockchain-based applications, issues such as data privacy, smart contract
enforceability, and digital identification standards must be solved.
User Experience: Blockchain apps must deliver a user-friendly experience
equivalent to centralized alternatives in order to gain widespread accept-
ance. Complex key management, transaction costs, and a lack of simple
interfaces have been identified as barriers to mainstream adoption.
Smart Contract Vulnerabilities: Smart contracts are vulnerable to errors and
vulnerabilities that nefarious parties can exploit. The 2016 DAO (decen-
tralized autonomous organization) attack highlighted the dangers of badly
designed smart contracts. The research focuses on establishing tools and
best practices for developing safe smart contracts.
These are some of the major difficulties that research scholars and developers are
addressing in order to improve existing blockchain platforms. The technology is con-
tinually growing, and ongoing R&D initiatives attempt to overcome these difficulties
and make blockchain more scalable, secure, and suited for a wide range of real-world
applications.
5.4.3 Cross-Chain Interoperability
Cross-chain interoperability fosters seamless communication among diverse block-
chains, enhancing decentralized collaboration by enabling efficient asset, data, and
76 Computational Intelligence in Biomedical and Health Informatics
information exchange. Challenges like scalability, security, and governance are being
tackled through Layer 2 solutions, verification, consensus protocols, and incentive
mechanisms, driving ongoing progress.
REFERENCES
Averin, A., & Averina, O. (2020, October). Review of blockchain frameworks and platforms.
2020 International Multi-Conference on Industrial Engineering and Modern Technolo-
gies (FarEastCon), IEEE, pp. 1–6.
Bartoletti, M., Lande, S., Pompianu, L., & Bracciali, A. (2017, December). A general frame‑
work for blockchain analytics. Proceedings of the 1st Workshop on Scalable and Resil-
ient Infrastructures for Distributed Ledgers, pp. 1–6.
Di Francesco Maesa, D., & Mori, P. (2020). Blockchain 3.0 applications survey. Journal of
Parallel and Distributed Computing, 138.
Grewal, H. K., & Bhambri, P. (2006). Globe-IT: Globalization of learning through open based
education and information technology. International Conference on Brand India: Issues,
Challenges and Opportunities, p. 24.
Gupta, S., & Bhambri, P. (2006). A competitive market is pushing site search technology to new pla‑
teaus. International Conference on Brand India: Issues, Challenges and Opportunities, p. 34.
Kamra, A., & Bhambri, P. (2007). Computer peripherals & interfaces. Technical Publications.
Kataria, A., Puri, V., Pareek, P. K., & Rani, S. (2023, July). Human activity classification
using G-XGB. 2023 International Conference on Data Science and Network Security
(ICDSNS), IEEE, pp. 1–5.
Kaur, D., Singh, B., & Rani, S. (2023). Cyber security in the metaverse. In Handbook of
research on AI-based technologies and applications in the era of the metaverse. IGI
Global, pp. 418–435.
Kaur, G., Bhambri, P., & Sohal, A. K. (2006, January). Review analysis of economic load dis‑
patch. National Conference on Future Trends in Information Technology.
Kramer, M. (2019). An overview of blockchain technology based on a study of public aware-
ness. Global Journal of Business Research, 13(1), 83–91.
Lu, Y. (2019). The blockchain: State-of-the-art and research challenges. Journal of Industrial
Information Integration, 15, 80–90.
Patel, K., Modi, R., Sharma, S., & Patel, M. (2022). A survey: Secure cloud data storage and
access control system using blockchain. In Soft computing for security applications:
Proceedings of ICSCS 2022. Springer Nature, pp. 195–207.
Puri, V., Kataria, A., Rani, S., & Pareek, P. K. (2023, September). DLT based smart medical
ecosystem. 2023 International Conference on Network, Multimedia and Information
Technology (NMITCON), IEEE, pp. 1–6.
Quasim, M. T., Khan, M. A., Algarni, F., Alharthy, A., & Alshmrani, G. M. M. (2020). Block-
chain frameworks. Decentralised Internet of Things: A Blockchain Perspective, 75–89.
Rani, S., Kumar, S., Kataria, A., & Min, H. (2023). SmartHealth: An intelligent framework to
secure IoMT service applications using machine learning. ICT Express, 48, 1–6.
Rani, S., Mishra, A. K., Kataria, A., Mallik, S., & Qin, H. (2023). Machine learning-based
optimal crop selection system in smart agriculture. Scientific Reports, 13(1), 15997.
Ren, Z., Xiang, H., Zhou, Z., Wang, N., & Jin, H. (2021, May). AlphaBlock: An evaluation
framework for blockchain consensus algorithms. Proceedings of the Ninth International
Workshop on Security in Blockchain and Cloud Computing, pp. 17–22.
Risius, M., & Spohrer, K. (2017). A blockchain research framework: What we (don’t) know,
where we go from here, and how we will get there. Business &Information Systems
Engineering, 59, 385–409.
Shebaro, B. (2022). Teaching blockchain in security. Journal of Computing Sciences in Col‑
leges, 37(7), 48–54.
Singh, P., Bhambri, P., & Sohal, A. K. (2006, January). Security in local networks. Paper pre-
sented at the National Conference on Future Trends in Information Technology.
Smetanin, S., Ometov, A., Komarov, M., Masek, P., & Koucheryavy, Y. (2020). Blockchain
evaluation approaches: State-of-the-art and future perspective. Sensors, 20(12), 3358.
78 Computational Intelligence in Biomedical and Health Informatics
Taş, R., & Tanrıöver, Ö. Ö. (2019, October). Building a decentralized application on the
ethereum blockchain. 2019 3rd International Symposium on Multidisciplinary Studies
and Innovative Technologies (ISMSIT), IEEE, pp. 1–4.
Wang, S., Ouyang, L., Yuan, Y., Ni, X., Han, X., & Wang, F. Y. (2019). Blockchain-enabled
smart contracts: Architecture, applications, and future trends. IEEE Transactions on Sys‑
tems, Man, and Cybernetics: Systems, 49(11), 2266–2277.
Zhang, R., Xue, R., & Liu, L. (2019). Security and privacy on blockchain. ACM Computing
Surveys (CSUR), 52(3), 1–34.
6 Blockchain Technology
State of Art and
Future Scenario
Sudheer Mangalampalli, Ganesh Reddy Karri,
Nukala Naveen Kumar, and Diya Gupta
6.1 INTRODUCTION
Blockchain is a decentralized and circulated computerized record that captures and
checks exchanges across numerous PCs or hubs (Hussain & Al‐Turjman, 2021). It
is intended to guarantee straightforwardness, an immutable nature, security, and
trust in an organization where members can cooperate and execute directly, without
the requirement for delegates (Maroufi, Abdolee, & Tazekand, 2019). Asit’s decen-
tralized, a blockchain consists of a chain of blocks, with each block containing a
rundown of exchanges. These exchanges are gathered, approved, and added to the
blockchain through an agreement system, like verification of work (PoW) or confir-
mation of stake (PoS) (Kaur, Chaturvedi, Sharma, & Kar, 2021). Whenever a block
is added to the chain, it turns into a long-lasting piece of the record and cannot be
changed retroactively without agreement from the organization members. One of the
basic highlights of blockchain innovation is its decentralized nature (García, 2021).
Rather than depending on an intermediary, like a bank or government, the blockchain
network works on a shared premise, where all members approach a duplicate of the
whole blockchain. This guarantees straightforwardness, as every member can auton-
omously confirm the exchanges and the honesty of the record (Kaur & Jindal, 2021,
August). The immutability of blockchain originates from its cryptographic proper-
ties. Each block contains a remarkable identifier called a hash, which is created by
applying a cryptographic calculation to the information inside the block (Hussein,
ArunKumar, Ramirez-Gonzalez, Abdulhay, Tavares, & de Albuquerque, 2018). If
any data inside the block is messed with, the hash of that block will also change,
making the organization aware of the adjustment. This makes it very hard to alter or
control past exchanges, upgrading the security and respectability of the blockchain.
Blockchain innovation has acquired conspicuousness because of its application in
cryptographic forms of money like Bitcoin, yet its true capacity goes a long way
beyond computerized monetary standards (Kataria, Puri, Pareek, & Rani, 2023,
July). It very well may be used in different areas, including finance, production, med-
ical care, and casting a ballot framework—and that’s only the tip of the iceberg—to
make straightforward, effective, and secure frameworks for recording and confirm-
ing exchanges or information (Wandhöfer & Nakib, 2023).
DOI: 10.1201/9781003459347-6 79
80 Computational Intelligence in Biomedical and Health Informatics
6.2 HISTORY OF BLOCKCHAIN
In the development of technological advancements, blockchain is one of the most
groundbreaking innovations in the potential to transform the industries and several sec-
tors to redefine trust in the digital age. Blockchain was started in the early 2000s, when
the convergence of computer science, cryptography, and distributed systems set stage for
the birth of a revolutionary technology (Akter, Michael, Uddin, McCarthy, & Rahman,
2022). In this chapter, we will explore the history of blockchain and its roots, types of
blockchain networks, and challenges. In October 2008, the concept of the blockchain
originated in a published paper and came to the market by the name “Bitcoin” as a
peer-to-peer digital cash framework. The paper explained in detail and outlined the
fundamental principles and mechanism of a decentralized, trustless digital currency
system called Bitcoin. The aim of the Bitcoin is to solve the problem of spending double
amounts in online transactions; the underlying technology it introduced is blockchain.
6.6.1 Centralized System
In a centralized system, an intermediatory central authority checks and controls the
data and transactions. The central authority has the power to take decisions to vali-
date transactions and to enforce rules. For example, imagine a banking system where
a central bank acts as the central authority for all the transactions. When you want to
transfer funds to another person, first you initiate the transaction through your bank.
The bank needs to verify and validate the transaction, deduct the funds from your
account, and update the recipient’s account. In this scenario, the bank has full control
over the transaction process, as well as all the data stored in a centralized database
maintained by the bank.
6.6.2 Decentralized Database
The decentralized system used in the blockchain operates on a peer-to-peer network
without relying on any central authority. Instead, multiple participants, or nodes,
collectively maintain and validate the blockchain. Each node in the network has a
duplicate of the entire blockchain, transactions are validated through a consensus
mechanism agreed upon by the network participants (Beck, Müller-Bloch, & King,
2018). For instance, suppose you want to transfer cryptocurrency to someone using
a blockchain-based platform. When you initiate the transaction, it is communicated
to all the nodes in the network. The nodes check the transaction and collectively
agree on its validity through a consensus mechanism, such as PoW (proof of work) or
PoS (proof of stake). Once consensus is reached, the transaction is added to a block,
which becomes a part of the blockchain. The process is transparent and eliminates
the need of central authority, as the validation is performed by the distributed net-
works of nodes.
Security
Centralized Systems: Security in centralized blockchains is dependent on the
central authority’s ability to secure the network and data. If the system is
compromised, the entire system could be vulnerable to attacks.
Blockchain Technology State of Art and Future Scenario 83
Scalability
Centralized Systems: Centralized blockchains may have a scalability benefit
because they can execute modifications more efficiently.
Decentralized Systems: Decentralized blockchains frequently experience
scalability issues due to the time and resources required to reach consensus
among a large number of participants.
Block Header: The block header of each block contains metadata and essential
information about the block, which includes:
Version: The version number of the blockchain protocol used.
Timestamp: The time when the block was created.
Previous Block Hash: The previous hash in the chain, linking it to the pre-
vious block.
Merkle Root: The hash value of the Merkle tree, which is a data structure
that summarizes and verifies the integrity of all transactions in the block.
Transactions or Data: The block contains a set of transactions or data that is
added to the chain.
Block Hash: The hash of each block is the unique identifier for the block and is
determined by applying a cryptographic hash function to the block header. It
serves to maintain the integrity and security of the data contained within it.
84 Computational Intelligence in Biomedical and Health Informatics
This process repeats for subsequent blocks, with new transactions being added, vali-
dated, and linked to the previous blocks. Each block contains a hash that depends on
the data within it, ensuring that any changes to the information would result in gen-
erating a new different hash value. This immutability and the cryptographic security
measures make the blockchain resistant to tampering and provide transparency and
integrity to the recorded transactions.
6.9 APPLICATIONS OF BLOCKCHAIN
Blockchain technology has a wide range of applications across various industries,
as it has unique characteristics such as decentralization, transparency, security, and
immutability. here are some of blockchain applications:
6.10.1 Public Blockchain
Public blockchain network is open to anyone, anyone can participate, and anyone
may validate, read, and write the transactions on the networks as everyone acts as
Blockchain Technology State of Art and Future Scenario 87
the central authority (Barański, Szymański, Sobecki, Gil, & Mora, 2020). Public
blockchains are decentralized; no single entity or organizations has control over the
network. All the transactions are public. Blockchain and its records are visible to
anyone on the network, and this transparency enhances trust. Although public, the
consensus method used by blockchain, such as proof-of-work (PoS) or proof-of-stake
(PoS), validates transactions and maintains network security: for example, bitcoin
(BTC), Ethereum (ETH).
6.10.2 Private Blockchain
A private blockchain network is restricted to a specific group of organizations.
Although it is decentralized, access to the network is controlled, and participants
require permission to join and engage in the activities (Ahmad, Salah, Jayaraman,
Yaqoob, & Omar, 2022). Private blockchains limit their participation to authorized
entities or individuals in order to tighten control over network operations. It also
incorporate measures to restrict access to transaction details, ensuring that the sen-
sitive data is not publicly visible. Private blockchains are faster and more scalable
compared to public blockchains since they have a smaller number of entities. An
example is Hyperledger Fabric.
6.10.3 Consortium Blockchain
A federated blockchain, sometimes referred to as a consortium blockchain, combines
public and private blockchain networks. It is a permissioned network in which a lim-
ited number of selected entities operate and validate transactions.
Consortium blockchains have a peer-selected set of validators who maintain the
network transactions. These blockchains are not fully decentralized; they are more
decentralized when compared to private blockchains as multiple organizations partic-
ipate in the network operation. Consortium blockchains are more scalable compared
to public blockchains, making them more suitable for applications with a huge num-
ber of transactions. Ripple and Quorum are examples. Each type of blockchain has
its own benefits and services. Public blockchains are safer and more straightforward,
but they can be increasingly slow and costly to utilize. Private blockchains are more
effective and secure, but they can be less straightforward. Consortium blockchains
offer a center ground between public and private blockchains, and they are often the
ideal choice for applications that require joint effort among different associations.
On the other hand, some drawbacks are associated with blockchain technology.
Even though blockchain has numerous advantages, it might not support all use
cases. Based on the organization’s and individual’s requirements, it is necessary to
check and evaluate the required specifications before adopting blockchain (Singh &
Bhambri, 2007). Let’s talk about the risk and challenges involved in deployment of
blockchain technology.
transactions over the network increases, the network becomes slower and less
efficient due to huge increase in transactions over the network. With the decen-
tralized nature of blockchain, scalability issues are more challenging to solve.
Security Flaws: As blockchain is designed to be secure, there are some
instances of security breaches and vulnerabilities. Vulnerabilities in the
cryptographic algorithm can lead to mainly financial losses.
Energy Consumption: Blockchain networks, particularly works on proof-
of-stake (PoS)-based systems, requires a significant computational power,
which leads to high energy consumption.
Interoperability: Blockchains exist as separate networks. The lack of stan-
dardized protocols and secure communication channels among different
blockchain platforms can inhibit data exchange and integration (Bhambri &
Gupta, 2007). Developing and incorporating a better solution is necessary.
Cost Management: Implementation of blockchain can be costly in terms of
initial setup and maintenance. Developing and maintaining blockchain net-
works require specialized skills, infrastructure, and computing resources.
REFERENCES
Ahmad, R. W., Salah, K., Jayaraman, R., Yaqoob, I., & Omar, M. (2022). Blockchain in oil
and gas industry: Applications, challenges, and future trends. Technology in Society, 68,
101941.
Akter, S., Michael, K., Uddin, M. R., McCarthy, G., & Rahman, M. (2022). Transforming
business using digital innovations: The application of AI, blockchain, cloud and data
analytics. Annals of Operations Research, 1–33.
Arenas, R., & Fernandez, P. (2018, June). CredenceLedger: A permissioned blockchain for
verifiable academic credentials. In 2018 IEEE International Conference on Engineering,
Technology and Innovation (ICE/ITMC) (pp. 1–6). IEEE.
Bamakan, S. M. H., Moghaddam, S. G., & Manshadi, S. D. (2021). Blockchain-enabled
pharmaceutical cold chain: Applications, key challenges, and future trends. Journal of
Cleaner Production, 302, 127021.
Barański, S., Szymański, J., Sobecki, A., Gil, D., & Mora, H. (2020). Practical I-voting on
stellar blockchain. Applied Sciences, 10(21), 7606.
Bathla, S., Jindal, C., & Bhambri, P. (2007, March). Impact of Technology on Societal Living
(p. 14). International Conference on Convergence and Competition.
Beck, R., Müller-Bloch, C., & King, J. L. (2018). Governance in the blockchain economy:
A framework and research agenda. Journal of the Association for Information Sys‑
tems, 19(10), 1.
Bhambri, P., & Gupta, S. (2007, September). Interactive Voice Recognition System (p. 107).
National Conference on Advancements in Modeling and Simulation.
Bhambri, P., Singh, R., & Singh, J. (2007). Wireless Security (p. 290). National Conference on
Emerging Trends in Communication & IT.
Chopra, A. R., & Nair, N. K. C. (2020, February). A review of methodical decentralisation
of energy and energy transactions utilising distributed ledger via transition archi-
tecture based framework. In 2020 IEEE Power and Energy Conference at Illinois
(PECI) (pp. 1–6). IEEE.
Dai, Y., Xu, D., Maharjan, S., Chen, Z., He, Q., & Zhang, Y. (2019). Blockchain and deep
reinforcement learning empowered intelligent 5G beyond. IEEE Network, 33(3), 10–17.
Dhanalakshmi, R., Vijayaraghavan, N., Sivaraman, A. K., & Rani, S. (2022). Epidemic aware-
ness spreading in smart cities using the artificial neural network. In AI-Centric Smart
City Ecosystems (pp. 187–207). CRC Press.
Blockchain Technology State of Art and Future Scenario 91
7.1 INTRODUCTION
Cryptocurrencies and other extremely innovative business models, including decen-
tralized autonomous organizations (DAOs), have come to the forefront thanks to the
development of blockchains, distributed ledgers (DLs), and decentralized finance
(DeFi). These models can be profitably transplanted to the digital revolution of the
outdated economy to support the implementation of initiatives like Industry 4.0,
despite the fact that they were initially developed for virtual businesses. They need
to be used in business operations that are essential to traditional brick and mortar
businesses for this to happen (Gbo et al., 2019). A block typically is made public to all
network users and may include transactions from many users. A safe and immutable
append-only chain is produced since each block also includes the transaction data
and the hash of the previous block. Each additional block that is added to the chain’s
terminus causes it to grow longer and longer. The potential of blockchain technology
has drawn the attention of numerous sectors and researchers. Currently available on
the market are around 3000 blockchain-based coins, and this number is growing. In
addition to digital currencies, blockchain technology has been used in a variety of
application domains, such as the Internet of Things, healthcare, economics, software,
and education, among others. A number of industries, including contact tracing,
supply chain management, immigration procedures, etc., have adopted blockchain
as a result of the sudden COVID-19 pandemic’s rapid spread (Hosen et al., 2020;
Saputhanthri et al., 2022).
The distribution of digital information, copyrights management, mobile networks,
and security for the Internet of Things were highlighted as the primary applica-
tion fields for blockchain technology in recent research on blockchain applications.
A description of blockchain’s potential and illustrations of its application in the
health industry have been provided in recent pertinent reviews (Chen et al., 2020).
Examples of these include managing supply chains in the healthcare industry, train-
ing in medicine, patient information access control, and safety in Internet of Things
technologies relevant to the sector.
While the private blockchains are generally available only to a certain group of users
and are restricted to all others, public blockchains are accessible to everybody. The
vast number of network members joining a secure public blockchain provides greater
security against data leaks, attacker tries, and other cybersecurity issues (Tosh
et al., 2018). The more users a blockchain has, the more secure it becomes. The public
blockchain system also maintains an incentive structure built into the protocol using
gaming theory, which means that network participants are rewarded monetarily for
preserving the network’s highest levels of integrity and ethics.
TABLE 7.1
Blockchain Differentiation in Terms of Pros and Cons
Particulars Public Private Hybrid Consortium
7.2.1 Consistency Data
Data consistency in a blockchain network refers to the idea of ensuring the same copy
of the data for every network node at all times. The consistency of data in the context
of Bitcoin is in question because it has been asserted to be both weak and strong
by various academics. The Eventual Consistency methodology, a methodology for
assuring data consistency for distributed networks, is suggested. By updating the
data sloppily and providing readers with the new values, the method strikes a balance
between the data’s consistency and availability.
7.2.2 Tamper-Proof Data
The ability of the facts to withstand purposeful or unintentional harm is ensured
by its tamper resistance. The blockchain is believed to be tamper-resistant, which
means that the information being kept or produced on its blocks can never be altered
or tampered with, either during or after generation. The information may be altered
in one of two ways: either by the miner trying to change the data or by the opponent
trying to alter it.
are in short supply due to the attacker’s flood of resource requests on the system.
The network’s numerous, distributed nodes throughout the world can launch DDoS
attacks against blockchains. The attackers seize a small number of network nodes by
making use of system flaws. Such attacks are incredibly difficult to handle because
they block nodes only one at a time.
7.3.1 51% Attack
In a blockchain network, a 51% attack occurs when one individual or group holds
over 50% of the computing power. With this control, they can potentially reverse
transactions, double-spend, or prevent some transactions from being recorded in the
blockchain. Imagine a group of friends playing a game. In this game, the group
makes decisions collectively, and no single person has too much power. However, if
one person manages to control more than half of the group, they could start making
unfair decisions that benefit only them. Similar to this, if one entity controls over
50% of the computer power on the network, they can exploit the transactions and
cause issues like transaction reversals or duplicating the use of digital currency.
7.3.3 Privacy Concerns
Blockchain technology creates privacy issues despite its openness and immutability
benefits. All transaction information is kept on the ledger by public blockchains,
which makes maintaining confidentiality challenging. While some blockchains
employ encryption methods to address privacy issues, finding the ideal balance
between transparency and privacy still poses difficulties. Imagine that while you
and other players are playing a game, every action you take is being recorded and is
available to everyone (Kataria et al., 2023, July). Transparency is beneficial, but if
you don’t want people to watch every move you make, it could make you feel uneasy.
Similar to private blockchains, public blockchains expose all transaction information
to the public, which compromises privacy. Even while some blockchains employ
encryption mechanisms to safeguard privacy, striking a balance between openness
and secrecy can be difficult.
7.3.5 Sybil Attacks
Sybil attacks happen when one person or organization generates numerous fictitious
identities or nodes in an effort to take over a blockchain network. Attackers have the
ability to alter consensus procedures and jeopardize the blockchain’s integrity by
controlling a sizable number of nodes. Consider a voting system in which each voter
has one vote. However, if a person makes several false identities and casts multiple
ballots, they can rig the results of the election. Similar to this, in a blockchain net-
work, an attacker might tamper with the consensus process and endanger the block-
chain’s integrity if they have control of numerous false identities or nodes.
are employed in blockchain to reach consensus on the state of the network. Each
system does, however, have weaknesses that can be used against it. For instance,
one entity may be able to manipulate the consensus and jeopardize the security of
the blockchain if it possesses an excessive amount of computer power or stake in
the network.
signatures as group signatures and ring signatures can be used. The group signa-
ture procedure is used to sign papers by its participants, who are individually pro-
vided private keys of their own and a shared public key. Any group member can sign
anonymously on the behalf of the whole group with a private key, and other group
members can verify their signatures using the shared public key. The consortium
blockchain can employ such anonymous digital signature systems; as the consortium
blockchain is managed by a few nodes, those nodes can also be chosen as the group
manager (Rani, Mishra, et al., 2023).
7.5 BLOCK STRUCTURE
A block contains different parts, as shown in Figure 7.3.
Timestamp: The blocks also have a timestamp. The timestamp in this case
corresponds to the time and date when a specific block was produced.
Hash: A cryptographic hash technique, such as SHA-256, is used to create a
unique identifier for each block called a hash. The block will contain the
hashes of the previous and current blocks. Blocks become immutable thanks
to hashes. With the help of the Merkle tree function, hashes are produced.
It remains in the header of the block. The hash of the Merkle tree root
uses a mathematical hashing process to create a 64-character code from
all the hash values related to each transaction that took place in a block.
A hash matching the Merkle tree’s base of every transaction in the block is
maintained for efficient handling and quicker verification of data. In a cryp-
tographic transaction procedure, a nonce is a 4-byte integer that is generated
randomly and is only used once. The nonce is used as a count throughout
the proof-of-work mining process, which miners attempt to resolve in order
to create a new block (Liu et al., 2021). The goal is to find a hash value lower
than the desired value, which changes based on how difficult the mathemat-
ical problem is.
7.5.1 Block Characteristics
Every block in a blockchain, as depicted in Figure 7.3, principally consists of three
components: the data, a hash of the block before it, and the current block’s hash. Any
type of data could be on the block. It may include of transactional records, health-
related records, insurance records, legal records, records of property ownership, etc.
Blockchain mostly comes in two varieties: public blockchain and private block-
chain. Another is a hybrid blockchain, which combines private and public block-
chains as shown in Figure 7.3.
Using the hash value depicted in Figure 7.4, each block is linked to the preceding
block. The hash number for a block changes if the value of any one piece of data
within that block changes. Various types of blockchain with appropriate attributes
are demonstrated in Figure 7.5. Checking a block’s hash makes it simple to determine
whether it has been modified. A block’s hash functions like a fingerprint. Chain of
blocks using the hash values are shown in Figure 7.6. Like a person’s fingerprint,
every block has a unique hash number. Because each block has the previous block’s
hash, a block’s hash changes if a block is modified, and it is also removed from all
forwarded blocks from the location and disconnected. Tampered block disconnected
Security Aspects of Blockchain Technology 101
from all forwarding blocks is shown in Figure 7.7. A fresh block is formed and then
broadcast across the network. Following a block’s verification, each node adds it to
its list of blocks, and so a false block may also be broadcast over a network. The
hash value of a block is examined to determine whether it is real or not (Bhambri
& Thapar, 2009). A block’s hash value must fall inside a certain range for others
to be able to determine that the computation was successfully done on the block in
question. During the addition of blocks, there is a delay to prevent the quick addition
of multiple false blocks. Verification blocks are shown in Figure 7.8. Between each
block creation in Bitcoin, there is a delay of around 10 minutes.
However, if one person or mining pool controls more than 51% of the network’s
processing power and continues to transmit phony blocks while also computing the
succeeding block hashes, this presents a serious problem for blockchain’s PoW consen-
sus. Because of this, some models employ proof-of-stake rather than proof-of-work.
Security Aspects of Blockchain Technology 103
7.5.2 Hash Method
A hash method, such as SHA1, accepts an input and produces a same-length output.
The hash function produces unique results for unique messages and identical results
for identical input. There are some internal states in a hash function. It alters those
internal states in accordance with the message it receives. The internal states change
using permutations and combinations in such a way that it is virtually impossible to
infer what was input from the hash result. The hash output can vary drastically when
the input is significantly altered. These modifications seem to happen at random and
are not governed by any rules. Nevertheless, it is purely arbitrary. However, nobody
has yet discovered a way to break the laws governing what happens when the input
is altered (Cai et al., 2022). The hashing algorithm is designed so that it cannot be
reversed. As seen in Figure 7.9, the output of block A’s hash changes noticeably when
its special number is increased by 1. The output of the hash bears no relationship to
the one advance in the unique number. The 20-bit hash is valuable for comprehen-
sion, even if it does not represent the real outcome of a hash algorithm. The nonce of
the block is a specific number, as seen in Figure 7.9.
7.5.3 Consensus Algorithm
7.5.3.1 Proof of Work
Proof-of-work (PoW) is the algorithm that is most widely used, but it uses a lot of
computational resources and energy while looking for solutions. The blockchain
algorithm determines whether or not a block is legitimate before adding it to the
network.
The POW algorithm is the solution. PoW calculates whether the block’s hash value
falls inside a given range. The block is approved if its value is inside the range; else, it
is rejected. In the PoW concept, miners compete with one another for mining blocks,
which entails locating a block’s hash value inside a given range. PoW is a competi-
tion among miners to solve a mathematical puzzle. The reward of mining that block
goes to whoever solves that problem or discovers a hash number with a nonce that
falls inside a certain range. In a PoW network, one needs to have at least 51% of the
computing capacity of the entire network in order to add a malicious block. If not,
malevolent addition attempts would be unsuccessful.
7.6.1 Healthcare
Everyone should prioritize the security of personal information, including health
information. (See Figure 7.11.) These health-related data are extremely valuable
because they are what pharmaceutical businesses rely on to succeed (Bhambri &
Nischal, 2008). Public blockchain technology can be used to protect medical
Security Aspects of Blockchain Technology 105
information from misuse and unauthorized access and also allows clinicians to view
patient-provided health data if they have their patients’ permission.
and investors are treated equally. Blockchain brings all parties together and erases
resultant differences.
7.6.3 Banking
Blockchain technology can significantly benefit the taxation industry. The existing
method of collecting taxes is not particularly reliable. Individuals may disagree when
it comes to paying taxes. They make up lies and refuse to pay taxes. A blockchain
framework is irreversible. It displays the genuine value of the system. When some-
one lies about paying their taxes, blockchain technology can quickly disclose pre-
cise information (Bhambri et al., 2008). Because this is unchangeable, people may
amend their tax information if they chose to. Because it is difficult to keep all of the
information up-to-date, those who tell lies regarding paying taxes will be caught.
Blockchain simplifies the detection of fraud. Value-added tax (VAT) fraud may be
decreased. The tax authorities now have to ask taxpayers for information one by one
under the current approach (Derwing et al., 2002). Not only is that difficult, but it’s
also risky in that it doesn’t provide accurate statistics. However, if blockchain is used
in the tax system, gathering data from the taxpayer is no longer required. Authorities
can view the outcome on a computer, and the record is accurate and true.
Money security is crucial for everyone, and people therefore utilize banks to safe-
guard their cash. However, not even banks can guarantee total security. But nowa-
days, the majority of our money is in digital rather than physical form. Digital items
must be stored on a server that uses software and is located somewhere. Banks can
be hacked, like any other piece of software. Money can disappear from a bank in
an instant. Blockchain technology is used to stop bank money from being stolen by
hackers. It is incredibly challenging to gain access to and steal money from a finan-
cial system that is based entirely on blockchain (Bhambri et al., 2009). Blockchain-
based banking guarantees that, even when a server is compromised, hackers cannot
Security Aspects of Blockchain Technology 107
immediately take the money since they first need to compromise every other server
that holds the same data.
REFERENCES
Arya, V., Rani, S., & Choudhary, N. (2022). Enhanced bio-inspired trust and reputation model
for wireless sensor networks. In Proceedings of Second Doctoral Symposium on Com‑
putational Intelligence: DoSCI 2021 (pp. 569–579). Springer.
Bhambri, P., Hans, S., & Singh, M. (2008, November). Bioinformatics—Friendship Between
Bits & Genes (pp. 62–65). International Conference on Advanced Computing & Com-
munication Technologies.
Bhambri, P., Hans, S., & Singh, M. (2009). Inharmonic signal synthesis & analysis. Technia:
International Journal of Computing Science and Communication Technologies, 1(2),
199–201.
Bhambri, P., & Nischal, P. (2008, May). Emerging New Economy in Telecommunication Sec‑
tor of India (p. 26). International Conference on Business Challenges & Strategies in
Emerging Global Scenario.
Bhambri, P., & Singh, M. (2008). Image transport protocol for JPEG image over loss prone
congested networks. PIMT Journal of Research, 1(1), 55–61.
Bhambri, P., & Thapar, V. (2009, May). Power Distribution Challenges in VLSI: An Introduc‑
tion. Paper presented at the International Conference on VLSI.
Cai, Z. et al. (2022). RBaaS: A robust blockchain as a service paradigm in cloud-edge collabora-
tive environment. IEEE Access, 10, 35437–35444, doi: 10.1109/ACCESS.2022.3161744.
Chen, B., Wu, L., Wang, H., Zhou, L., &He, D. (2020, June). A block chain-based searchable
public-key encryption with forward and backward privacy for cloud-assisted vehicular
social networks. IEEE Transactions on Vehicular Technology, 69(6), 5813–5825, doi:
10.1109/TVT.2019.2959383.
Derwing, T. M., Rossiter, M. J., & Munro, M. J. (2002). Teaching native speakers to listen to
foreign-accented speech. Journal of Multilingual and Multicultural Development, 23(4),
245–259.
108 Computational Intelligence in Biomedical and Health Informatics
Gbo, A., Cornelius, C., Mahmoud, Q. H., & Mikael Eklund, J. (2019). Block Chain Technology
in Healthcare: ASystematic Review (vol. 7, 56, pp. 1–30). Healthcare, Multidisciplinary
Digital Publishing Institute.
Giraldo, F. D., Milton, B., & Gamboa, C. E. (2020, October). Electronic voting using block-
chain and smart contracts: Proof of concept. IEEE Latin America Transactions, 18(10),
1743–1751, doi: 10.1109/TLA.2020.9387645.
Gonzalez, M. (2021). Machine learning for anomaly detection in network security. Machine
Learning Applications Conference Proceedings, 1.
Hosen, A. S. M. S. et al. (2020). Blockchain-based transaction validation protocol for a
secure distributed IoT network. IEEE Access, 8, 117266–117277, doi: 10.1109/
ACCESS.2020.3004486.
Kataria, A., Puri, V., Pareek, P. K., & Rani, S. (2023, July). Human activity classification
using G-XGB. In 2023 International Conference on Data Science and Network Security
(ICDSNS) (pp. 1–5). IEEE.
Kaur, D., Singh, B., & Rani, S. (2023). Cyber security in the metaverse. In Handbook of Research
on AI-Based Technologies and Applications in the Era of the Metaverse (pp. 418–435).
IGI Global.
Krech Thomas, H. (2004). Training Strategies for Improving Listeners’ Comprehension of
Foreign-Accented Speech (Doctoral dissertation). University of Colorado.
Liu, Z., Pang, H., Li, Y., & Li, S. (2021). Research on distributed energy network transaction
model based on blockchain.2021 International Conference on Computer, Blockchain
and Financial Development (CBFD), 311–314, doi: 10.1109/CBFD52659.2021.00069.
Qiu, M., Qiu, H., Zhao, H., Liu, M., & Thuraisingham, B. (2020). Secure data shar-
ing through untrusted clouds with blockchain-enhanced key management.2020 3rd
International Conference on Smart BlockChain (SmartBlock), 11–16, doi: 10.1109/
SmartBlock52591.2020.
Rani, S., Arya, V., & Kataria, A. (2022). Dynamic pricing-based e-commerce model for the
produce of organic farming in India: A research roadmap with main advertence to
vegetables. In Proceedings of Data Analytics and Management: ICDAM 2021(vol. 2,
pp. 327–336). Springer.
Rani, S., Kumar, S., Kataria, A., & Min, H. (2023). SmartHealth: An intelligent framework to
secure IoMT service applications using machine learning. ICT Express, 48, 1–6.
Rani, S., Mishra, A. K., Kataria, A., Mallik, S., & Qin, H. (2023). Machine learning-based
optimal crop selection system in smart agriculture. Scientific Reports, 13(1), 15997.
Rathod, V., Raisoni, U., Rathod, V. U., & Gumaste, S. V. (2022, December). Role of neural
network in mobile ad hoc networks for mobility prediction. International Journal of
Communication Networks and Information Security, 14(1s), 153–166.
Saputhanthri, A., De Alwis, C., & Liyanage, M. (2022). Survey on blockchain-based
IoT payment and marketplaces. IEEE Access, 10, 103411–103437, doi: 10.1109/
ACCESS.2022.3208688.
Son, S., Lee, J., Kim, M., Yu, S., Das, A. K., &Park, Y. (2020). Design of secure authentication
protocol for cloud-assisted telecare medical information system using block chain. IEEE
Access, 8, 192177–192191, doi: 10.1109/ACCESS.2020.3032680.
Thorat, N. N. (2015, March). Visual cryptography schemes for secret colour image sharing
using general access structure and stamping algorithm. International Journal of Engi‑
neering Research & Technology (IJERT), 4(3), ISSN: 2278-0181.
Thorat, N. N. (2016, February). Embedded visual cryptography for secret colour images shar��-
ing using stamping algorithm, encryption and decryption technique. IJARCCE, 5(2),
ISSN: (Online) 2278-1021.
Tosh, D., Shetty, S., Foytik, P., Kamhoua, C., & Njilla, L. (2018). CloudPoS: A proof-of-stake
consensus design for blockchain integrated cloud.2018 IEEE 11th International Confer‑
ence on Cloud Computing (CLOUD), 302–309, doi: 10.1109/CLOUD.2018.
Security Aspects of Blockchain Technology 109
Wang, T., Wang, Q., Shen, Z., Jia, Z., &Shao, Z. (2022, August 15). Understanding charac-
teristics and system implications of DAG-based blockchain in IoT environments. IEEE
Internet of Things Journal, 9(16), 14478–14489, doi: 10.1109/JIOT.2021.3108527.
Wellington dos Santos Abreu, A., Coutinho, E. F., & Ilane Moreira Bezerra, C. (2022, March).
Performance evaluation of data transactions in blockchain. IEEE Latin America Trans‑
actions, 20(3), 409–416, doi: 10.1109/TLA.2022.9667139.
Yang, J., Paudel, A., & Gooi, H. B. (2021, May). Compensation for power loss by a proof-of-
stake consortium blockchain microgrid. IEEE Transactions on Industrial Informatics,
17(5), 3253–3262, doi: 10.1109/TII.2020.3007657.
Yao, S. et al. (2022, December). Blockchain-empowered collaborative task offloading for
cloud-edge-device computing. IEEE Journal on Selected Areas in Communications,
40(12), 3485–3500, doi: 10.1109/JSAC.2022.3213358.
8 Computational
Intelligence and
Blockchain in Diversified
Applications
Shailesh Shetty S. and Supriya B. Rao
8.1 INTRODUCTION
Blockchain technology has emerged as a groundbreaking innovation with the poten-
tial to revolutionize various industries, including healthcare. In particular, the use of
blockchain for storing clinical trials and records holds immense promise for enhanc-
ing data security, integrity, and accessibility. Ethereum, a decentralized blockchain
platform, offers unique features that make it well-suited for this purpose. This report
explores the use of Ethereum blockchain for storing clinical trials and records, high-
lighting its benefits and potential applications.
Public blockchain.
Private blockchain.
Hybrid blockchain.
Public blockchain uses the Ethereum platform, whereas private blockchain makes
use of Hyperledger Fabric.
Blockchain uses Proof of Stake concepts, and consensus mechanisms are built
into it. To provide security, it uses hashing algorithms.
Each block is connected to previous block by means of hashing.
Ichikawa, D., Kashiyama, M., & Ueno, T. (2017). Blockchain technology for healthcare:
A systematic literature review. Healthcare Informatics Research, 23(3), 214–220.
This systematic literature review provides an overview of existing research on
blockchain technology in healthcare. It explores various use cases, including clinical
data management, medical records, and supply chain integrity. The paper identifies
the potential of blockchain in enhancing data security, privacy, and interoperability
while emphasizing the need for standardization and further research.
accessibility, and interoperability. It identifies gaps in the current research and sug-
gests future directions for leveraging blockchain in PHR management (Rani, Mishra,
Kataria, Mallik, & Qin, 2023).
Liang, X., Zhao, J., Shetty, S., Liu, J., Li, D., & Tan, H. (2020). Integrating blockchain
for data sharing and collaboration in mobile healthcare applications. IEEE Access, 8,
132900–132912.
This research paper explores the integration of blockchain, specifically Ethereum,
in mobile healthcare applications to enable secure and privacy-preserving data shar-
ing and collaboration. It emphasizes the benefits of blockchain in ensuring data
integrity, consent management, and interoperability among different healthcare
stakeholders (Kataria, Puri, Pareek, & Rani, 2023).
This literature survey provides a comprehensive overview of the utilization of
Ethereum blockchain for storing clinical trials and records. Existing research demon-
strates the potential benefits of blockchain technology, including enhanced data
security, integrity, transparency, and interoperability. However, challenges such as
scalability, regulatory compliance, and integration with existing systems need to be
addressed. Further research and development are required to realize the full potential
of Ethereum blockchain in healthcare data management and to revolutionize the field
of clinical trials and records.
Xu, M., Chen, X., & Kou, G. (2019). A systematic review on blockchain. Financial Inno-
vation, 5, Article ID: 27.
Blockchain is considered by many to be a disruptive core technology. Although
many researchers have realized the importance of blockchain, the research of block-
chain is still in its infancy. Consequently, this study reviews the current academic
research on blockchain, especially in the subject area of business and economics.
Based on a systematic review of the literature retrieved from the Web of Science ser-
vice, we explore the top-cited articles, most productive countries, and most common
keywords. Additionally, we conduct a clustering analysis and identify the follow-
ing five research themes: “economic benefit,” “blockchain technology,” “initial coin
offerings,” “fintech revolution,” and “sharing economy.” Recommendations on future
research directions and practical applications are also provided in this chapter.
Taherdoost, H. (2023). Smart contracts in blockchain technology: A critical review. Infor-
mation, 14, 117. https://doi.org/10.3390/info14020117.
By utilizing smart contracts, which are essentially scripts that are anchored in a
decentralized manner on blockchains or other similar infrastructures, it is possible
to make the execution of predetermined procedures visible to the outside world. The
programmability of previously unrealized assets, such as money, and the automation
of previously manual business logic are both made possible by smart contracts. This
revelation inspired us to analyze smart contracts in blockchain technologies written
in English between 2012 and 2022. The scope of research is limited to the jour-
nal. Reviews, conferences, book chapters, theses, monographs, and interview-based
works, as well as articles in the press, are eliminated. This review comprises 252 arti-
cles over the last ten years with “blockchain,” “block-chain,” “smart contracts,” and
“smart contracts” as keywords. This chapter discusses smart contracts’ present status
Computational Intelligence and Blockchain 115
and significance in blockchain technology. The gaps and challenges in the relevant
literature have also been discussed, particularly emphasizing the limitations. Based
on these findings, several research problems and prospective research routes for
future study that will likely be valuable to academics and professionals are identified.
8.3 METHODOLOGY
8.3.1 introdUction
This section outlines the methodology employed in this research paper to investigate
the use of Ethereum blockchain for storing clinical trials and records. The meth-
odology encompasses data collection, literature review, analysis, and synthesis of
relevant information to support the research objectives.
trials and records. These case studies were selected based on their relevance, sig-
nificance and the extent to which they illustrate the benefits and challenges of using
Ethereum blockchain in real-world healthcare settings.
8.4 IMPLEMENTATION
This section describes the implementation strategy for utilizing Ethereum blockchain
as a storage solution for clinical trials and records. The implementation focuses on
the technical aspects of deploying Ethereum blockchain, smart contracts, and data
integration to ensure secure and efficient management of healthcare data.
8.4.1 Infrastructure Setup
The implementation begins with setting up the necessary infrastructure to support
Ethereum blockchain. This involves configuring a network of Ethereum nodes and
deploying a private or consortium blockchain network. The selection of the network
type depends on the specific requirements, such as privacy, control, and scalabil-
ity. Tools such as Ganache, Geth, or Parity can be used to set up and manage the
Ethereum network.
Computational Intelligence and Blockchain 117
deploying the smart contracts, and configuring the user interfaces and access man-
agement systems. After deployment, the implementation should be evaluated based
on predefined criteria, such as data security, accessibility, usability, and scalability.
Feedback from users, stakeholders, and domain experts can be gathered to assess the
effectiveness and usability of the Ethereum blockchain solution for storing clinical
trials and records.
The implementation strategy outlined in this research paper provides a roadmap
for utilizing Ethereum blockchain in storing clinical trials and records. By following
these steps, healthcare organizations can leverage the benefits of Ethereum blockchain,
including enhanced security, transparency, and data integrity. The successful imple-
mentation and evaluation of Ethereum blockchain in healthcare data management pave
the way for a paradigm shift in the way clinical trials and records are stored, managed,
and shared, ultimately leading to improved patient care and medical research.
8.5 RESULTS
This section presents the results of the implementation of Ethereum blockchain for
storing clinical trials and records. The results highlight the key findings and out-
comes obtained from deploying the Ethereum blockchain solution in a real-world
healthcare setting. The evaluation focuses on aspects such as data security, accessi-
bility, usability, and scalability.
8.5.1 Data Security
The implementation of Ethereum blockchain for storing clinical trials and records
has demonstrated a significant improvement in data security. The use of blockchain
technology has ensured that the data stored on the network was tamper-proof and
resistant to unauthorized modifications. The cryptographic mechanisms employed
in Ethereum blockchain provided strong data integrity and immutability, enhancing
trust in the stored clinical trial data. The smart contracts implemented access control
mechanisms, allowing only authorized parties to interact with the data, ensuring
privacy and confidentiality.
8.5.2 Accessibility
The implementation of Ethereum blockchain improved the accessibility of clinical trial
data for relevant stakeholders. Through the user interfaces and access management
mechanisms, researchers, healthcare providers, and patients could easily access and
retrieve the necessary data for their specific roles and permissions. The decentralized
nature of the blockchain network eliminated the need for intermediaries and facilitated
direct access to the data, enhancing efficiency and reducing information silos.
8.5.3 Usability
The user interfaces developed as part of the implementation proved to be intuitive
and user-friendly. Researchers, healthcare providers, and patients reported a positive
Computational Intelligence and Blockchain 119
user experience in interacting with the Ethereum blockchain solution for clinical
trials and records. The interfaces allowed for seamless data entry, consent manage-
ment, and retrieval of trial results. The system provided clear instructions and feed-
back, minimizing user errors and enhancing usability.
8.5.4 Scalability
The scalability of the Ethereum blockchain implementation for storing clinical trials
and records was evaluated under different scenarios. The implementation demon-
strated satisfactory performance in handling a significant volume of data and concur-
rent user interactions. However, scalability challenges were observed when dealing
with a large number of transactions or when the network experienced heavy traffic.
Further optimization and scaling techniques, such as sharding or sidechains, may be
required to address scalability concerns in large-scale deployments.
8.6 CONCLUSION
This research paper explored the utilization of Ethereum blockchain for storing clin-
ical trials and records and demonstrated its potential to revolutionize healthcare data
management. The implementation of Ethereum blockchain showcased significant
improvements in data security, accessibility, and usability, thus fostering trust, trans-
parency, and efficiency in the management of clinical trial data.
The results highlighted the robustness of Ethereum blockchain in ensuring data
integrity and immutability, safeguarding against unauthorized modifications and
tampering. The cryptographic mechanisms employed by Ethereum blockchain pro-
vided a secure and tamper-proof environment for storing clinical trials and records,
enhancing trust among stakeholders.
The implementation also enhanced the accessibility of clinical trial data by elim-
inating intermediaries and enabling direct access for researchers, healthcare provid-
ers, and patients. The user interfaces and access management mechanisms facilitated
seamless data retrieval, entry, and consent management, thereby improving effi-
ciency and reducing information silos.
While the implementation demonstrated satisfactory scalability in handling a
significant volume of data and user interactions, challenges were identified when
dealing with large-scale transactions and network congestion. Further optimization
techniques, such as sharding or sidechains, should be explored to address scalability
concerns in extensive deployments.
Feedback from users and stakeholders indicated a high level of satisfaction with
the improved data security, transparency, and privacy offered by the Ethereum
blockchain solution. The system instilled confidence in the integrity of clinical
trial data and simplified the consent management process, fostering a positive user
experience.
However, certain limitations and challenges were also identified, including data
integration complexities during migration from legacy systems and the need for
ongoing maintenance and updates to keep pace with evolving requirements and
upgrades of the Ethereum platform.
Overall, the results of this research demonstrate the potential of Ethereum block-
chain to transform healthcare data management, particularly in storing clinical trials
and records. The implementation showcased the benefits of enhanced data secu-
rity, accessibility, and usability, contributing to improved patient care and medical
research.
Future research should focus on addressing scalability challenges and further
exploring the integration of Ethereum blockchain with existing healthcare systems.
Additionally, investigating the regulatory and legal implications of storing clinical
trial data on blockchain and addressing privacy concerns will be vital for wider
adoption.
By harnessing the power of Ethereum blockchain, healthcare organizations can
usher in a new era of secure, transparent, and efficient clinical trial data management,
ultimately advancing medical research, improving patient outcomes, and shaping the
future of healthcare.
Computational Intelligence and Blockchain 121
8.7 FUTURE WORK
Blockchain applications has a wide variety of scope in various fields like defense,
government agencies, supply chain management, finance, retail, clinical manage-
ment, etc. Due to the transparency and security that blockchain provides, we can
use it to develop various applications that will be useful to the society. Consider the
design of an electronic voting machine using blockchain that enables people from
different parts of the voting district to vote while sitting inside their homes, just by
having their system or cell phone in hand and authorizing and then casting their vote.
With blockchain technology, the voting machine can assure 100% poll rate because
people need not make a trip to the polling centers, and people residing in different
countries can all participate in voting.
Blockchain with IoT technologies can create many applications that will have
major effects in days to come. Nowadays people prefer smart automation, which
requires the IoT, but, with the help of blockchain, data and other security measures
can be incorporated, thereby building robust applications. Supply chain management
is one field in which, with the help of blockchain technology, we can not only com-
pletely eliminate the third party but also bring buyer and seller together, helping the
customer to get products and services at reasonable prices. The banking sector will
speed up the transfer of funds between two people residing in different countries by
using blockchain technology. Overall, blockchain is an emerging area that is getting
attention due to its unique transparency, security, and various other features. Much
more work needs to be done, and much ongoing research is needed to incorporate
blockchain in various other domains.
The creation of vaccines must undergo many trials and procedures before they
can be delivered. If we incorporate blockchain into that process, then the timeline of
vaccine production can be shortened, resulting in the saving of many lives in future.
No participants in the testing process can produce fake test results since all the stake-
holders will have a copy of reports at their nodes.
REFERENCES
Bhambri, P. (2010). An adaptive and resource efficient hand off in recovery state in geographic
Adhoc networks. In International Conference on Engineering Innovations-A Fillip to
Economic Development, CGI, Fatehgarh Sahib, Punjab, 18–20 February 2010.
Bhambri, P., & Hans, S. (2009). Direct non iterative solution based neural network for image
compression. PIMT Journal of Research, 2(2), 64–67.
Bhambri, P., & Hans, S. (2010). Evaluation of integrated development environments for
embedded system design. Apeejay Journal of Management and Technology, 5(2),
138–146.
Bhambri, P., & Thapar, V. (2010). Iris biometric—a review. Paper presented at the National
Conference on Cellular and Molecular Medicine.
Dagher, G. G., Mohler, J., Milojkovic, M., Marella, P. B., & Ancile Consortium. (2018). Ancile:
Privacy-preserving framework for access control and interoperability of electronic health
records using blockchain technology. Sustainable Cities and Society, 39, 283–297.
Ichikawa, D., Kashiyama, M., & Ueno, T. (2017). Blockchain technology for healthcare:
A systematic literature review. Healthcare Informatics Research, 23(3), 214–220.
122 Computational Intelligence in Biomedical and Health Informatics
Kataria, A., Puri, V., Pareek, P. K., & Rani, S. (2023, July). Human activity classification
using G-XGB. In 2023 International Conference on Data Science and Network Security
(ICDSNS) (pp. 1–5). IEEE.
Kaur, D., Singh, B., & Rani, S. (2023). Cyber security in the metaverse. In Handbook of Research
on AI-Based Technologies and Applications in the Era of the Metaverse (pp. 418–435).
IGI Global.
Kuo, T.-T., Kim, H.-E., & Ohno-Machado, L. (2017). Blockchain distributed ledger technolo-
gies for biomedical and health care applications. Journal of the American Medical Infor-
matics Association, 24(6), 1211–1220.
Liang, X., Zhao, J., Shetty, S., Liu, J., Li, D., & Tan, H. (2020). Integrating blockchain for
data sharing and collaboration in mobile healthcare applications. IEEE Access, 8,
132900–132912.
Puri, V., Kataria, A., Rani, S., & Pareek, P. K. (2023, September). DLT based smart medical
ecosystem. In 2023 International Conference on Network, Multimedia and Information
Technology (NMITCON) (pp. 1–6). IEEE.
Rani, S., Kumar, S., Kataria, A., & Min, H. (2023). SmartHealth: An intelligent framework to
secure IoMT service applications using machine learning. ICT Express, 48, 1–6.
Rani, S., Mishra, A. K., Kataria, A., Mallik, S., & Qin, H. (2023). Machine learning-based
optimal crop selection system in smart agriculture. Scientific Reports, 13(1), 15997.
Rindflesch, T. C., & Fiszman, M. (2013). The role of blockchain technology in biomedical
science. Journal of Biomedical Informatics, 46(5), 728–738.
Roehrs, A., da Costa, C. A., da Rosa Righi, R., & da Silva, D. S. (2018). Personal health records:
A systematic literature review. Journal of Medical Internet Research, 20(5), e183.
Taherdoost, H. (2023). Smart contracts in blockchain technology: A critical review. Informa-
tion, 14, 117. https://doi.org/10.3390/info14020117.
Thapar, V., & Bhambri, P. (2009, May). Context free language induction by evolution of deter-
ministic pushdown automata using genetic programming. Paper presented at the Inter-
national Conference on Downtrend Challenges in IT, p. 33.
Tosh, D., & Dave, M. (2019). Blockchain-based clinical trials: Applications and challenges.
Journal of Healthcare Engineering, 2019, Article ID: 827069.
Xu, M., Chen, X., & Kou, G. (2019). A systematic review on blockchain. Financial Innova-
tion, 5, Article number: 27.
Zhang, P., Schmidt, D. C., White, J., Lenz, G., & Rosenbloom, S. T. (2017). FHIRChain:
Applying blockchain to securely and scalably share clinical data. Computers in Biology
and Medicine, 89, 392–397.
9 Computational
Intelligence and
Blockchain in
Distributed Applications
Benefits and Challenges
Satyam, V. Vijaya Kishore, K. Neelima,
and N. Ashok Kumar
9.1 INTRODUCTION
Blockchain is a decentralized peer-to-peer network used mainly for cryptocur-
rencies, that is, Bitcoin, capable of storing data on thousands of servers following
a collective trust model among these unknown peers. Now, the Blockchain tech-
nology is used in various other applications like real estate, global trade and com-
merce, capital markets, asset management, etc. These applications require that all
the transactions are recorded among the nodes, which cannot be deleted or edited
in a distributed immutable ledger, thus ensuring that all the transactions are avail-
able at each node (Dhanalakshmi et al., 2022). This process is known as distrib-
uted computing for real-time updating of every transaction that takes place. The
advantages offered include elimination of the requirement of a central authority to
manage the network that makes the blockchain secure, transparent, and immutable
(Kaur et al., 2023).
Also the distributed network uses the consensus protocol as every node has
to communicate with its neighbor node in order to arrive at a common decision
followed by blockchain that helps the network to achieve reliability and maintain
trust and the present state of the ledger within the peers (Rani, Mishra et al., 2023).
Once a set of transactions is validated and a block is created by a miner, that block
is added to the blockchain (Singh et al., 2010). Even though many miners are
working on block creation, the final block that is being added to the blockchain
is created by a single winning miner, and all the other nodes in the blockchain
should agree and synchronize with the present state of the blockchain (Puri et al.,
2023, September).
9.1.1 Complications
The complications that can occur when distributed computing is used for blockchain
are as follows:
9.1.3 Blockchain Architecture
The blockchain-enabled cloud computing system is shown in Figure 9.1. Blockchain
can be described as a distributed database or public ledger of all transactions or
digital events performed and shared among participating parties. Most participants
in the system must agree on the validity of each transaction in the public ledger. It is
Distributed Applications 125
impossible to remove data after it has been input (Garg & Bhambri, 2011). Every sin-
gle transaction that has ever been recorded in the blockchain may be independently
verified.
The characteristics of the blockchain include the following:
Consensus: All participating nodes in the network must agree on the validity
of a transaction.
Provenance: All the participants in the network can know the lineage of an
asset recorded on the blockchain.
Immutability: It is impossible to tamper with any transaction on the block-
chain. If any transaction is wrongly executed, a new transaction must be
issued to right the wrongs of the previous transaction.
Distributed: A peer-to-peer blockchain network ensures that there is no single
point of failure. If any node fails, it does not affect the functioning of the
network, as no single authority can control the whole network.
Security of the Transactions: Security is achieved through public key cryp-
tography where every network participant has public and private keys to
encrypt the data and issue digital signatures.
Coherence: Blockchain allows only a single value of truth to exist in that every
participant in the network sees the same copy of the distributed ledger.
Decentralization: Blockchain eliminates the need for outsiders, contrary to
the centralized mode that requires transactions to be approved by a trusted
entity (e.g., the National Bank), causing cost and execution bottlenecks on
central servers.
Persistency: This allows checking transactions instantaneously so that fair
miners cannot admit to fraudulent transactions.
126 Computational Intelligence in Biomedical and Health Informatics
Anonymity: There is a possibility that a client can sign up for a blockchain and
use a generated address that does not reveal the client’s real identity.
Auditability: A Bitcoin blockchain records data regarding client modifications
using the UTXO (unused transaction output) mechanism. Each transaction
pertains to exchanges that have not been used before. If the present trans-
action is registered in the blockchain, the unspent transactions are changed
from unspent to spent when the transaction is registered. There is also the
possibility of effortlessly confirming transactions.
9.1.4 Applications of Blockchain
The applications of blockchain include many sectors as shown in Figure 9.2. The sev-
eral financial applications include Internet of Things (IoT) (safety and privacy, stock
exchange, financial services, P2P financial market, crowdfunding, etc.). The appli-
cations toward society like (blockchain music and blockchain government) include
advertising, defense, mobile apps, supply chain, automotive (Joshi et al., 2018), adver-
tising (Chen et al., 2018), agriculture (Dave et al., 2019), voter registration, identity
management, education, law and monitoring, digital documents, and asset tracking.
Intrusion detection (Baboshkin et al., 2022), computerized ownership management,
registers of property titles, etc. (Monrat et al., 2019). Further the other uses include
e-business, reputation management, etc. (web community, academics, etc.), security
and privacy (risk management, privacy, and improved security), healthcare, insur-
ance, copyright protection, energy, and so forth (Zheng et al., 2018).
For example, in the healthcare industry, blockchain technology allows for the
safekeeping of patient records where access is handled by AI- and big-data-based
computational intelligence (Daley, 2020). In the financial services sector, increased
transaction speeds and mutual trust are enhanced by merging these two technologies
(Soleymani & Paquet, 2020) to address each other’s weaknesses.
The major applications that use AI-integrated blockchain are 6G networks, smart
cities, banking, and driverless cars (Moosavi & Taherdoost, 2022).
9.2.2.4 Scalability
The key to the successful rollout of smart blockchain applications is in solving the
scalability problem (Worley & Skjellum, 2018). Blockchain decentralized applications
need the underlying blockchain platform to function. If the scalability and perfor-
mance of the system are inadequate, it cannot be deployed as a large-scale application
(Bhambri & Kaur, 2011). The blockchain’s scaling concerns can be categorized as
consistency problems, network latency, and performance constraints. Most nodes need
to agree on the transaction data to guarantee the blockchain’s security. The blockchain
splits if the need for consistency in the distributed network is neglected in favor of
faster growth. Due to its decentralized nature, blockchain’s scalability is limited by
the time it takes for data to travel between nodes in the network. This is particularly
true for longer delays. The key problem that prevents the widespread use of block-
chain applications is the impact of transaction performance on scalability (Nasir et al.,
2022). To maintain security and ultimate consistency, blockchain transactions cannot
be completed in parallel, which makes it impossible to boost transaction throughput.
9.3 CONCLUSION
The convergence of computational intelligence (CI) and blockchain (BC) promises
an avenue for enhancing the efficiency and security of distributed applications. This
chapter explores the synergistic potential of CI and BC in the context of distributed
applications, examining the benefits and challenges that arise from their integration
with individual highlights. Furthermore, the benefits and challenges imposed by
AI-integrated blockchain are detailed along with their potential real-world applications
like supply chain management, finance, healthcare, the Internet of Things (IoT), etc.
REFERENCES
Baboshkin, P., Mikhaylov, A., & Shaikh, Z. A. (2022). Sustainable Cryptocurrency Growth
Impossible? Impact of Network Power Demand on Bitcoin Price. Finansovyj žhurnal—
Financial Journal, 116–130. https://ideas.repec.org/a/fru/finjrn/220308p116-130.html.
Bhambri, P., Gupta, O. P., Hans, S., & Singh, R. (2011). Conceptual Translation as a Part
of GENE Expression. In International Conference on Advanced Computing and Com-
munication Technologies (Sponsored by IEEE Delhi Section, IEEE Computer Society
Chapter, Delhi Section and IETE Delhi Centre) (pp. 506–508).
Bhambri, P., & Kaur, A. (2011). Image Parsing: Models and Algorithms. Indian Journal of
Applied Research, 1(3), 129–131.
Bhambri, P., Singh, M., Suresh, H., & Singh, I. (2010). Data Mining Model for Protein
Sequence Alignment. In Proceedings of the International Conference on Data Mining
(pp. 612–617).
Chen, W., Xu, Z., Shi, S., Zhao, Y., & Zhao, J. (2018). A Survey of Blockchain Applications in
Different Domains. In Proceedings of the 2018 International Conference on Blockchain
Technology and Application, Seoul, Republic of Korea, 20–22 June 2018 (pp. 17–21).
132 Computational Intelligence in Biomedical and Health Informatics
Corradini, E., Nicolazzo, S., Nocera, A., Ursino, D., & Virgili, L. (2022). A Two-Tier Block-
chain Framework to Increase Protection and Autonomy of Smart Objects in the IoT.
Computer Communications, 181, 338–356.
Daley, S. (2020). Tastier Coffee, Hurricane Prediction and Fighting the Opioid Crisis: 31
Ways Blockchain and AI Make a Powerful Pair. Built-in in April. https://builtin.com/
artificial-intelligence/blockchain-ai-examples.
Dave, D., Parikh, S., Patel, R., & Doshi, N. (2019). A Survey on Blockchain Technology and
Its Proposed Solutions. Procedia Computer Science, 160, 740–745.
Destefanis, G., Marchesi, M., Ortu, M., Tonelli, R., Bracciali, A., & Hierons, R. (2018). Smart
Contracts Vulnerabilities: A Call for Blockchain Software Engineering? In Proceed-
ings of the 2018 International Workshop on Blockchain Oriented Software Engineering
(IWBOSE), Campobasso, Italy, 20–28 March (pp. 19–25).
Dhanalakshmi, R., Vijayaraghavan, N., Sivaraman, A. K., & Rani, S. (2022). Epidemic Aware-
ness Spreading in Smart Cities Using the Artificial Neural Network. In AI-Centric Smart
City Ecosystems (pp. 187–207). CRC Press.
EI Azzaoui, A., Singh, S. K., Pan, Y., & Park, J. H. (2020). Block5GIntell: Blockchain for
AI-Enabled 5G Networks. IEEE Access, 8, 145918–145935. https://doi.org/10.1109/
ACCESS.2020.3014356.
Garg, D., & Bhambri, P. (2011). A Novel Approach for Fusion of Multimodality Medical
Images. CiiT International Journal of Digital Image Processing, 3(10), 576–580.
Habib, G., Sharma, S., Ibrahim, S., Ahmad, I., Qureshi, S., & Ishfaq, M. (2022). Block-
chain Technology: Benefits, Challenges, Applications, and Integration of Blockchain
Technology with Cloud Computing. Future Internet, 14, 341. https://doi.org/10.3390/
fi14110341.
Joshi, A. P., Han, M., & Wang, Y. (2018). A Survey on Security and Privacy Issues of Block-
chain Technology. Mathematical Foundations of Computing, 1, 121.
Kataria, A., Puri, V., Pareek, P. K., & Rani, S. (2023, July). Human Activity Classification
using G-XGB. In 2023 International Conference on Data Science and Network Security
(ICDSNS) (pp. 1–5). IEEE.
Kaur, D., Singh, B., & Rani, S. (2023). Cyber Security in the Metaverse. In Handbook of Research
on AI-Based Technologies and Applications in the Era of the Metaverse (pp. 418–435).
IGI Global.
Khowaja, S. A., Dev, K., Qureshi, N. M. F., Khuwaja, P., & Foschini, L. (2022). Toward Indus-
trial Private AI: A Two-Tier Framework for Data and Model Security. IEEE Wireless
Communications, 29, 76–83.
Kumar, A. (2022). A Broad Survey on AI Integration in Blockchain: A Forward-Looking
Approach. In Proceedings of the National Conference on Recent Trends of Engineer-
ing & Technologies, (RTET-2022) Ramgovind Group of Colleges, Koderma, Jharkhand,
India, 5–7 October 2022 (pp. 1–38).
Kumar, H., & Borah, U. (2021). Recent Developments in Joint Artificial Technology and
Blockchain Technology: Its Potential Use for the Future. Supremo Amicus, 26, 130.
Li, W., Su, Z., Li, R., Zhang, K., & Wang, Y. (2020). Blockchain-Based Data Security for Arti-
ficial Intelligence Applications in 6G Networks. IEEE Network, 34, 31–37.
Lopes, V., Alexandre, L. A., & Pereira, N. (2019). Controlling Robots using Artificial Intelli�-
gence and a Consortium Blockchain. arXiv: 1903.00660.
Luu, L., Chu, D.-H., Olickel, H., Saxena, P., & Hobor, A. (2016). Making Smart Contracts
Smarter. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Com-
munications Security, Vienna, Austria, 24–28 October 2016 (pp. 254–269).
Makarius, E. E., Mukherjee, D., Fox, J. D., & Fox, A. K. (2020). Rising with the Machines:
A Sociotechnical Framework for Bringing Artificial Intelligence into the Organiza-
tion. Journal of Business Research, 120, 262–273.
Distributed Applications 133
Monrat, A. A., Schelén, O., & Andersson, K. (2019). A Survey of Blockchain from the Perspec-
tives of Applications, Challenges, and Opportunities. IEEE Access, 7, 117134–117151.
Moosavi, N., & Taherdoost, H. (2022). Blockchain-Enabled Network for 6G Wireless Com-
munication Systems. In Proceedings of the International Conference on Intelligent
Cyber Physical Systems and Internet of Things (ICoICI 2022), Coimbatore, India, 11–12
August. Engineering Cyber-Physical Systems and Critical Infrastructures. Springer:
Berlin/Heidelberg, Germany.
Nasir, M. H., Arshad, J., Khan, M. M., Fatima, M., Salah, K., & Jayaraman, R. (2022). Scal-
able Blockchains—A Systematic Review. Future Generation Computer Systems, 126,
136–162.
Puri, V., Kataria, A., Rani, S., & Pareek, P. K. (2023, September). DLT Based Smart Medical
Ecosystem. In 2023 International Conference on Network, Multimedia and Information
Technology (NMITCON) (pp. 1–6). IEEE.
Rajagopal, B. R., Anjanadevi, B., Tahreem, M., Kumar, S., Debnath, M., & Tongkachok, K.
(2022). Comparative Analysis of Blockchain Technology and Artificial Intelligence and
Its Impact on Open Issues of Automation in Workplace. In Proceedings of the 2022 2nd
International Conference on Advance Computing and Innovative Technologies in Engi-
neering (ICACITE), Greater Noida, India, 28–29 April (pp. 288–292).
Rani, S., Kumar, S., Kataria, A., & Min, H. (2023). SmartHealth: An Intelligent Framework
to Secure IoMT Service Applications using Machine Learning. ICT Express, 48, 1–6.
Rani, S., Mishra, A. K., Kataria, A., Mallik, S., & Qin, H. (2023). Machine Learning-Based
Optimal Crop Selection System in Smart Agriculture. Scientific Reports, 13(1), 15997.
Singh, I., Salaria, D., & Bhambri, P. (2010). Comparative Analysis of JAVA and AspectJ on
the Basis of Various Metrics. In International Conference on Advanced Computing and
Communication Technologies (IEEE Sponsored) (pp. 714–720). IEEE.
Soleymani, F., & Paquet, E. (2020). Financial Portfolio Optimization with Online Deep Rein-
forcement Learning and Restricted Stacked Auto Encoder—Deep Breath. Expert Sys‑
tems with Applications, 156, 113456.
Stradling, A., & Voorhees, E. (2018). System and Method of Providing a Multi-Validator Ora-
cle. Google Patents US2,018,009,131,6A1.
Syed, F., Gupta, S. K., Alsamhi, S. H., Rashid, M., & Liu, X. (2021). A Survey on Recent
Optimal Techniques for Securing Unmanned Aerial Vehicles Applications. Transactions
on Emerging Telecommunications Technologies, 32, e4133.
Weng, J., Weng, J., Cai, C., Huang, H., & Wang, C. (2021). Golden Grain: Building a Secure
and Decentralized Model Marketplace for MLaaS. IEEE Transactions on Dependable
and Secure Computing, 19, 3149–3167.
Worley, C., & Skjellum, A. (2018). Blockchain Tradeoffs and Challenges for Current and
Emerging Applications: Generalization, Fragmentation, Sidechains, and Scalability. In
Proceedings of the 2018 IEEE International Conference on Internet of Things (iThings)
and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Phys-
ical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), Halifax, NS,
Canada, 30 July 2018–3 August 2018 (pp. 1582–1587).
Yang, R., & Yu, Y. (2021). Artificial Convolutional Neural Network in Object Detection and
Semantic Segmentation for Medical Imaging Analysis. Frontiers in Oncology, 11, 1–9.
https://doi.org/10.3389/fonc.2021.638182.
Zhang, M., Li, L., Wang, H., Liu, Y., Qin, H., & Zhao, W. (2019). Optimized Compression
for Implementing Convolutional Neural Networks on FPGA. Electronics, 8, 295. https://
doi.org/10.3390/electronics8030295.
Zheng, Z., Xie, S., Dai, H.-N., Chen, X., & Wang, H. (2018). Blockchain Challenges and
Opportunities: A Survey. International Journal of Web and Grid Services, 14, 352–375.
10 Computational and
Blockchain Methods in
Distributed Biomedical
and Health Informatics
Applications, Architecture,
Applications, and
Challenges
Harpreet Kaur Channi, Pulkit Kumar,
and Parminder Singh
10.1 INTRODUCTION
In biomedical and health informatics, computational techniques and blockchain
technology are altering data handling, analysis, and sharing. Computational meth-
ods and blockchain in distributed biomedical and health informatics may improve
healthcare systems and patient outcomes. Interdisciplinary biomedical informatics
collects, stores, analyses, and interprets biomedical data using computers (Naresh
et al. 2023). Traditional approaches cannot meet current medicine’s data needs due
to its volume and complexity. Machine learning, artificial intelligence, and big data
analytics aid decision-making, illness diagnosis, treatment planning, and medica-
tion development. Machine learning algorithms can diagnose illnesses from med-
ical imaging, forecast patient outcomes, and find patterns in massive genetic data
(Aminizadeh et al. 2023). The ability to process vast amounts of data quickly and
accurately has significantly enhanced understanding of diseases and potential treat-
ment options. In Figure 10.1, a workflow for healthcare applications based on block-
chain is illustrated (Khezr et al. 2019).
Despite the promising potential, adopting computational and blockchain methods
in biomedical and health informatics is challenging. First and foremost is the issue
of data standardization and interoperability. Healthcare data is often siloed in dif-
ferent formats and systems, making it difficult to integrate seamlessly into a unified
blockchain framework. Developing standardized data protocols and achieving wide-
spread interoperability are crucial to unlock the full potential of these technologies.
Another concern is the computational power and resources required for processing
FIGURE 10.1 Workflow for healthcare applications based on blockchain (Khezr et al. 2019;
CC. BY 4.0.).
more accurate diagnoses and treatment plans. In addition to medical imaging, com-
putational methods are crucial in genomics and personalized medicine. Analyzing
genomic data requires sophisticated algorithms to handle large-scale genetic infor-
mation and identify potential disease-related variations. By leveraging computa-
tional techniques, researchers can better understand the genetic basis of diseases and
tailor treatments based on an individual’s genetic profile, leading to more effective
and targeted therapies (Saif et al. 2020).
Furthermore, biomedical and health informatics utilize machine learning and
artificial intelligence to uncover patterns and trends in healthcare data. Using
machine learning algorithms, predictive modelling can anticipate disease progres-
sion, identify at-risk populations, and optimize treatment protocols. These data-
driven insights can significantly enhance patient care and resource allocation within
the healthcare system. Moreover, computational methods have been instrumental
in advancing drug discovery and development processes. Researchers can identify
potential drug candidates through virtual screening and molecular modelling and
assess their interactions with biological targets. This approach expedites the drug
discovery timeline and reduces the cost of experimental testing, ultimately devel-
oping more efficient and targeted medications (Patel et al. 2022). In parallel, health
informatics has transformed how electronic health records (EHRs) are managed and
analyzed. Computational techniques enable integrating and analyzing EHR data
from various sources, empowering clinicians to make evidence-based decisions and
improve patient safety. Additionally, natural language processing (NLP) algorithms
facilitate the extraction of valuable information from unstructured clinical notes,
enabling better utilization of patient data and accelerating medical research. Ethical
considerations and data privacy are paramount in biomedical and health informatics.
Computational methods must adhere to strict regulations and safeguard patient confi-
dentiality. Researchers and practitioners must also be vigilant in addressing potential
biases (Patel et al. 2022).
analysis found 3621 publications on biomedical and health informatics from 1978
to July 2023. After removing brief surveys, Notes, Erratum Editorial, and Letters,
we had 3450 articles. After excluding research papers based on publication status, it
remained at 2956. Earth planetary, agriculture and biological sciences, environmen-
tal sciences, business, management and accounting and finally, engineering were the
final subjects for exclusion. Leaving 2329 items.
Analysis of citations is a fundamental idea in bibliometrics. Citations are the refer-
ences that authors make in their writing to previously published works. Researchers
can evaluate the impact and importance of certain publications by looking at the cita-
tion patterns of academic papers, as shown in Table 10.2. Highly cited publications
are frequently regarded as important and can influence the course of a field’s study.
One of the most used bibliometric metrics is the impact factor. It displays the typical
number of citations received by papers published in a specific publication over a
particular period. Journals with higher impact factors are more prominent in their
respective fields. Impact factors can vary between disciplines, and it is important to
analyze them carefully because they may not accurately reflect the caliber of indi-
vidual papers. Another essential component of bibliometric analysis is collaboration
Distributed Biomedical and Health Informatics 139
TABLE 10.1
Main Information of Data Taken from Scopus
Description Results
TABLE 10.2
Top 15 Journals in the Research Area under the Study
Rank Sources Articles
FIGURE 10.3 Top five journals yearly growth from 1978 to 2023.
10.4.1.2 Institutions
In Figure 10.5, there is a visualization of the publications by the top five institu-
tions throughout the world and their cooperation among institutions over the past
three decades. Five major universities are contributing to the Scopus Journal:
Columbia University scored rank 1 with 125 publications; after that, the University of
Washington achieved rank 2 with 115 publications. At the same time, the University
of California, Harvard Medical School, and the University of Utah scored third,
fourth, and fifth rank, respectively, with net publications of 114, 91, and 89 in the
Scopus database from 1978 to 2023.
10.4.1.6 Keywords
In Figure 10.9, a cloud structure of keywords is shown, but the point that makes the fig-
ure different is the number of keywords. The cloud top 25 keywords include “Adult,”
“Article,” “Artificial Intelligence,” “Bioinformatics,” “Biomedical Engineering,”
“Biomedical Research,” “Biomedical Technology,” “Biomedical Technology
Assessment,” “Clinical Research,” “Confidentiality,” “Data Base,” “Data Mining,”
“Decision-Making,” “Delivery of Healthcare,” “Education,” “Electronic Health
Record,” and “Electronic Health Records.” Figure 10.10 shows the tree map structure
of the keywords by different authors in their publications.
In summary, the need for computational and blockchain methods in distributed bio-
medical and health informatics stems from their potential to address various chal-
lenges in healthcare, including data management, privacy, security, and personalized
medicine. These technologies promise to transform healthcare systems, improve
patient outcomes, and revolutionize medical research and clinical practice. As they
continue to evolve and overcome existing challenges, computational and blockchain
methods are likely to play an increasingly critical role in shaping the future of health-
care (Dong et al. 2023).
10.6 APPLICATIONS OF COMPUTATIONAL
AND BLOCKCHAIN METHODS
Computational and blockchain methods have numerous applications in distributed
biomedical and health informatics, revolutionizing the healthcare industry in various
ways. Here are some key applications:
Clinical Trials and Research: Blockchain can enhance transparency and data
integrity in clinical trials. Smart contracts can automate trial protocols, and
decentralized ledgers can track the entire trial process, reducing fraud and
ensuring the authenticity of results (Ali et al. 2023).
Medical Supply Chain Management: Blockchain-based systems can track
the movement of medical supplies, pharmaceuticals, and vaccines. This
enhances supply chain transparency, reduces counterfeiting risks, and
ensures the authenticity of medications.
Healthcare Billing and Insurance: Blockchain-based smart contracts can
automate billing and insurance claims processes, reducing administrative
overhead and enhancing transparency in financial transactions.
Public Health Surveillance: Computational methods analyze public health
data to monitor disease outbreaks, track epidemiological trends, and plan
interventions for population health improvement.
Patient Consent and Privacy Management: Blockchain enables patients to
control access to their health data and explicitly consent to data sharing.
This enhances patient privacy and builds trust in data exchange processes.
translating data from one format to another and facilitating data flow between dis-
tributed components. They also help manage data security, access control, and data
synchronization across different nodes in the network. Another key aspect of this
architecture is using secure and decentralized technologies, such as blockchain (Issa
et al. 2023).
With its immutability, transparency, and cryptographic security properties, block-
chain technology can enhance data integrity and privacy in health informatics. It can
securely store sensitive patient data, clinical trial records, and supply chain tracking
in the pharmaceutical industry. Furthermore, cloud computing plays a vital role in
the architecture of distributed biomedical and health informatics. Cloud-based solu-
tions offer scalable and flexible computing resources, allowing healthcare organiza-
tions to store and process vast amounts of data cost-effectively. Cloud services also
facilitate data sharing and collaboration among geographically dispersed healthcare
providers and researchers. The architecture incorporates robust authentication and
encryption mechanisms in data privacy and security. Access control mechanisms
ensure that only authorized personnel can access specific health data, safeguarding
patient confidentiality (Saba et al. 2023).
Data encryption during transmission and storage also protects against unautho-
rized interception and tampering. Machine learning and artificial intelligence are
integrated into the architecture to derive meaningful insights from vast health-
care data. These technologies can assist in diagnosing diseases, predicting patient
outcomes, and optimizing treatment plans, contributing to personalized medi-
cine and improved patient care. As healthcare continues to evolve, the architec-
ture of distributed biomedical and health informatics will continuously adapt to
address emerging challenges and leverage cutting-edge technologies. By promot-
ing interoperability, decentralization, data security, and advanced analytics, this
architecture paves the way for a more connected and data-driven healthcare eco-
system, ultimately improving healthcare delivery and patient outcomes (Baranwal
et al. 2023).
10.7.1 Graphical Representation
The architecture of distributed biomedical and health informatics can be visualized
as a series of interconnected components as shown in Figure 10.11.
10.8.2 Future Scope
Advancements in AI and Machine Learning: With continuous advances
in AI and machine learning, computational methods will become more
powerful and effective in analyzing healthcare data. Improved algorithms
will enable better disease diagnosis, treatment optimization, and predictive
analytics.
Decentralization and Patient Empowerment: Blockchain technology can
empower patients to have greater control over their health data. Patients can
securely share their medical records with healthcare providers, researchers,
and insurers, fostering a patient-centric healthcare system.
Distributed Biomedical and Health Informatics 151
FIGURE 10.12 Challenges and future scope in implementing computational and blockchain
methods.
152 Computational Intelligence in Biomedical and Health Informatics
10.9 CONCLUSION
The bibliometric analysis in this chapter provides valuable insights into research in
this interdisciplinary domain. The analysis reveals a burgeoning research landscape,
indicating a growing interest in exploring the potential of computational and block-
chain methods to revolutionize healthcare practices. One of the prominent findings of
this analysis is the diverse range of applications of these methods in biomedical and
health informatics. Researchers have explored various areas, including data man-
agement, patient records, clinical trials, medical imaging, drug development, and
personalized medicine. The versatility of these applications underscores their signif-
icance in addressing critical challenges within the healthcare sector. Collaboration
and interdisciplinarity emerge as key themes in the research landscape. The inter-
section of computer science, biomedical engineering, healthcare informatics, and
blockchain technology fosters collaborative efforts to create innovative solutions.
Interdisciplinary research has proven instrumental in developing novel approaches
that leverage the strengths of different fields, promising groundbreaking advance-
ments in healthcare technology. The bibliometric analysis identifies highly influen-
tial publications within the area with significant citation counts. These works have
shaped the research direction and laid the foundation for further exploration. They
serve as pillars of knowledge, guiding researchers toward more impactful and rele-
vant studies.
While the analysis highlights the potential of computational and blockchain meth-
ods, it also identifies several challenges researchers face. Data privacy and security
concerns, scalability issues, interoperability, and regulatory compliance pose signifi-
cant obstacles to adopting these methods in real-world healthcare settings. Addressing
these challenges is crucial to fully unlock the potential of these technologies and
ensure their successful integration into healthcare systems. Furthermore, the analysis
sheds light on emerging trends that hold promise for the future of distributed biomed-
ical and health informatics. These include the integration of artificial intelligence and
machine learning with blockchain technology, using smart contracts in healthcare
workflows, and exploring decentralized data-sharing platforms. These trends sig-
nify the evolving nature of research in this field and reflect the continuous pursuit of
cutting-edge solutions to address the changing needs of the healthcare industry.
REFERENCES
Ali, A., B. A. S. Al-Rimy, F. S. Alsubaei, A. A. Almazroi and A. A. Almazroi (2023). “Health-
Lock: Blockchain-Based Privacy Preservation Using Homomorphic Encryption in Inter-
net of Things Healthcare Applications.” Sensors 23(15): 6762.
Ameijeiras-Rodriguez, C., R. Rb-Silva, J. M. Diniz, J. Souza and A. Freitas (2023). Use of
Decentralized-Learning Methods Applied to Healthcare: A Bibliometric Analysis. In
International Conference on Computational Science. Springer.
Aminizadeh, S., A. Heidari, S. Toumaj, M. Darbandi, N. J. Navimipour, M. Rezaei, S. Talebi,
P. Azad and M. Unal (2023). “The Applications of Machine Learning Techniques in
Medical Data Processing Based on Distributed Computing and the Internet of Things.”
Computer Methods and Programs in Biomedicine: 107745.
Distributed Biomedical and Health Informatics 153
Arora, S., P. Gupta, V. Goar, M. Kuri, H. K. Channi and C. L. Chowdhary (2023). Key Based
Steganography Using Convolutions. Advances in Information Communication Technol-
ogy and Computing. In Proceedings of AICTC 2022. Springer: 617–625.
Balani, N. and P. Chavan (2023). “Design of Heuristic Model to Improve Blockchain-Based
Sidechain Configuration.” International Journal of Computational Science and Engi‑
neering 26(4): 372–384.
Baranwal, G., D. Kumar and D. P. Vidyarthi (2023). Blockchain Based Resource Allocation
in Cloud and Distributed Edge Computing: A Survey. Computer Communications 209:
469–498. https://doi.org/10.1016/j.comcom.2023.07.023
Channi, H. K. and C. L. Chowdhary (2023). Blockchain-Based IoT E-Healthcare. Handbook
of Research on Solving Societal Challenges Through Sustainability-Oriented Innova‑
tion. IGI Global: 56–73.
Channi, H. K., P. Shrivastava and C. L. Chowdhary (2022). Digital Transformation in Health-
care Industry: A Survey. In Next Generation Healthcare Informatics. Springer: 279–293.
Chowdhary, C. L. and H. K. Channi (2022). Deep Learning Empowered Fight Against COVID-
19: A Survey. In Next Generation Healthcare Informatics. Springer: 251–264.
Djenouri, Y., A. Yazidi, G. Srivastava and J. C.-W. Lin (2024). Blockchain: Applications, Chal�
lenges, and Opportunities in Consumer Electronics. IEEE Consumer Electronics Maga‑
zine 13(2): 36–41. https://doi.org/10.1109/MCE.2023.3247911
Dong, J., G. Xu, C. Ma, J. Liu and U. G. O. Cliff (2024). Blockchain-Based Certificate-Free
Cross-Domain Authentication Mechanism for Industrial Internet. IEEE Internet of
Things Journal 11(2): 3316–3330. https://doi.org/10.1109/JIOT.2023.3296506
Elangovan, D., C. S. Long, F. S. Bakrin, C. S. Tan, K. W. Goh, S. F. Yeoh, M. J. Loy, Z. Hus��-
sain, K. S. Lee and A. C. Idris (2022). “The Use of Blockchain Technology in the Health
Care Sector: Systematic Review.” JMIR Medical Informatics 10(1): e17278.
Hemdan, E. E.-D., W. El-Shafai and A. Sayed (2023). “Integrating Digital Twins with IoT-
Based Blockchain: Concept, Architecture, Challenges, and Future Scope.” Wireless Per‑
sonal Communications: 1–24.
Issa, W., N. Moustafa, B. Turnbull, N. Sohrabi and Z. Tari (2023). “Blockchain-Based Feder-
ated Learning for Securing Internet of Things: A Comprehensive Survey.” ACM Com‑
puting Surveys 55(9): 1–43.
Khezr, S., M. Moniruzzaman, A. Yassine and R. Benlamri (2019). “Blockchain Technology
in Healthcare: A Comprehensive Review and Directions for Future Research.” Applied
Sciences 9(9): 1736.
Kumar, S., H. Banka and B. Kaushik (2023). “Ultra-Lightweight Blockchain-Enabled RFID
Authentication Protocol for Supply Chain in the Domain of 5G Mobile Edge Comput-
ing.” Wireless Networks: 1–22.
Kuo, T.-T., H. Zavaleta Rojas and L. Ohno-Machado (2019). “Comparison of Blockchain Plat-
forms: A Systematic Review and Healthcare Examples.” Journal of the American Medi‑
cal Informatics Association 26(5): 462–478.
Kuzior, A. and M. Sira (2022). “A Bibliometric Analysis of Blockchain Technology Research
Using VOSviewer.” Sustainability 14: 8206.
Li, Z., D. Kong, Y. Niu, H. Peng, X. Li and W. Li (2023). “An Overview of AI and Blockchain
Integration for Privacy-Preserving.” arXiv preprint arXiv: 2305.03928.
Mahajan, H. and K. Reddy (2023). “Secure Gene Profile Data Processing using Lightweight
Cryptography and Blockchain.” Cluster Computing: 1–19.
Mololoth, V. K., S. Saguna and C. Åhlund (2023). “Blockchain and Machine Learning for
Future Smart Grids: A Review.” Energies 16(1): 528.
Naresh, V. S., M. Thamarai and V. D. Allavarpu (2023). “Privacy-Preserving Deep Learning
in Medical Informatics: Applications, Challenges, and Solutions.” Artificial Intelligence
Review: 1–43.
154 Computational Intelligence in Biomedical and Health Informatics
11.1 INTRODUCTION TO BLOCKCHAIN
The concept of blockchain is truly fascinating. It operates on a decentralized and
opensource system, and it is a highly efficient digital ledger. It tracks connections
across multiple computers, and the verified “blocks” form a chain that cannot be
altered by any individual. The community ensures that each transaction is accurate
and maintains the integrity of the information. This security system is unbreakable,
assuring that the data remains unaltered and authentic, which is essential for its
reliability.
Blockchain is a dispersed record organization that regularly adds new records
while ensuring that none are ever deleted or changed without widespread promise.
The cost of a blockchain error is determined by the cryptographic hash that connects
records in new data blocks with those in existing data blocks (Kumar et al., 2022).
Data processing is not done in an integrated position thanks to the distributed block-
chain ledger architecture, which also makes the data transparent and accountable
to all users of the network. To improve and secure the system, this decentralized
system prevents a single attack. By reducing remedial preparation and scrutinizing
by two times, it enables the persistent repair and permits the superior well-being of
information over valid periods and properties for both patients and doctors. Keeping
medicinal histories on a blockchain permits patients to be comfortable with where
their material is going (Assaye et al., 2021).
Blockchain is a system of decentralized connections that houses information. It is a
capacious way to keep knowledge secure and confidential for the association, simpli-
fying the protection and privacy of principal information. It is the perfect device for
carefully as well as centrally fulfilling all applicable credential requirements (Rani,
Kataria et al., 2023). Blockchain also facilitates the use of particular persistent record
designated users who meet the test norms. Peer-to-peer (P2P) systems of actual com-
puters that continue, protect, and prove transactional or past information are what the
term “blockchain” means. As all system contributors protect and conserve data and
advantages it offers to organizations before diving into the use cases (Dhanalakshmi
et al., 2022; Chanda et al., 2021):
Data access and transfer make it possible for data to be transferred among
many parties to create a single source of “truth” by documenting facts and
data in an unchanging and transparent manner (Bilal et al., 2021, May).
Profiles and permissions are maintained for certification or evidence, enabling
identification details to be verified without compromising personal data.
Conducting transactions and payments in real-time is feasible. Settlements are
actions taken to fulfill financial obligations by tracking the flow of products,
revenues, or services. Multiple parties exchange tokens having intrinsic
value, such as virtual currency (Tanwar et al., 2022, September).
Reduction of Data Silos: Healthcare systems around the world struggle with
the issue of data silos, which provide patients and their medical provid-
ers with only a partial picture of their medical history (Puri et al., 2023,
September).
In 2016, medical errors caused by poor coordination of treatment, including
missed or incorrect actions and incomplete patient records, ranked as the
third leading cause of death in the United States, as reported by Johns
Hopkins University. To improve the recruitment process for healthcare insti-
tutions, it is recommended to speed up the credentialing process (Rachna
et al., 2022). This presents an opportunity for healthcare organizations,
insurers, and medical facilities to profit from their current credentials data
on former and present personnel (Rachna et al., 2020).
Transparency and Assurance for Partners: This includes firms that use
locum tenens as subcontractors and requires cutting-edge virtual health
delivery models that inform patients of the credentials of the medical staff.
11.4 TECHNOLOGIES OF BLOCKCHAIN
This chapter can assist you in understanding blockchain and participating in discus-
sions about it as a burgeoning technology (Soltanisehat et al., 2023).
The healthcare industry has tremendous potential with the use of blockchain tech-
nology, particularly in the realm of smart contracts. Such contracts allow for direct
agreements between parties that can be executed instantly once the terms of the con-
tract are met. This technology provides numerous benefits to the healthcare indus-
try, including the encryption of personal health records. Only primary healthcare
Healthcare Computational Intelligence and Blockchain 161
practitioners with the appropriate key can access these records, ensuring that patient
data remains confidential and inaccessible to the public (Rana et al., 2021a, 2021b).
By integrating blockchain technology into medical recordkeeping, healthcare pro-
viders can ensure secure data sharing, efficient maintenance of electronic medical
records, streamlined insurance administration, and effective management of admin-
istrative tasks. Blockchain technology provides the most effective solution to address
these critical areas (Paika & Bhambri, 2013).
The healthcare industry is currently undergoing a transformational shift thanks to
blockchain technology. This innovative tool enables the collection of patient health
data, ensuring accuracy and authenticity. The use of the Bitcoin blockchain also
allows medical records to be easily accessible in one place, transforming our under-
standing of an individual’s medical condition. Additionally, blockchain technology
protects user confidentiality and addresses concerns about misleading results and
fragmented data in clinical studies, thereby increasing trust in research.
Businesses can utilize analysis tools to identify market opportunities, while drugs
can be managed on the blockchain to ensure a secure chain from manufacturer to
client with digital credibility. This gives healthcare professionals the confidence
that patients will have access to necessary medical equipment and enables effective
patient monitoring through the use of blockchain and IoT technologies.
Although doctors may experience longer wait times in remote patient monitor-
ing and emergency response, blockchain technology can be used to track patient
room temperatures, bed usage, and supply availability. A healthcare network built
on blockchain technology also provides institutions and healthcare suppliers with
a reliable digital identity, improving the traceability and responsiveness of the sup-
ply chain. Overall, the application of blockchain technology in healthcare logistics
is improving transparency and efficiency in the industry (Bhambri et al., 2022).
Significant applications of blockchain for healthcare are analyzed in the Table 11.1.
Blockchain technology has a wide range of applications and is highly versatile.
Cryptocurrencies, such as Bitcoin, are among the most well-known applications of
blockchain technology. They provide users with the ability to conduct transactions
from anywhere without any restrictions on location. Unlike local payment services,
cryptocurrencies make cross-border money transfers more accessible and efficient
(Rani, Pareek et al., 2023).
In underprivileged areas, access to accurate birth and death certificates can be dif-
ficult. However, blockchain technology offers a secure and authenticated database of
these certificates, which is only accessible to authorized personnel (Kaur et al., 2012b).
This could be a potential solution to the issue of accessing these important documents.
Online identity verification is crucial for financial transactions. With blockchain
technology, users can share their authenticated identity with any service provider.
The authentication process includes various techniques such as facial recognition
and user authentication, providing a unified solution for identity verification.
The Internet of Things (IoT) is a system that comprises interconnected devices
that collect data. Using blockchain technology is essential to ensure that the sys-
tem is secure since the security of the system is only as strong as its weakest link.
Smart Homes is a prime example of IoT implementation (Bhambri & Gupta, 2013a,
2013b).
162 Computational Intelligence in Biomedical and Health Informatics
TABLE 11.1
Significant Applications of Blockchain for Healthcare
S. No. Applications Description References
1 Stored information In a clinical investigation, healthcare (De Aguiar et al., 2020), (Ejaz
of an individual professionals generate various types et al., 2021), (Aggarwal et al.,
patient of data and patient information, such 2021), (Mackey et al., 2019),
as blood tests, quality assessments, (Bansal et al., 2012b), (Goyal
estimates, and well-being et al., 2012)
questionnaires. To ensure accuracy,
they can compare this data to the
original documents recorded on the
blockchain system. This system
provides a secure foundation for
data-sharing cryptography, and any
concerns about accuracy can be
addressed by browsing the saved
data. Healthcare practitioners must
record patient details, including
name, date of birth, diagnosis,
therapies, and ambulatory history in
the electronic health record (EHR)
found in both current databases and
cloud computing. It is essential to
ensure that all information is
accurately recorded and accessible to
benefit both patients and healthcare
professionals.
2. Analyze the effects Effective analysis of specific (Khatoon, 2020), (Safi et al.,
of a particular procedures on a significant portion of 2020), (Prerna et al., 2012),
procedure the patient population relies heavily (Javaid et al., 2020), (Kaur
on access to verified patient data. et al., 2012a), (Hussien et al.,
This data is crucial for better 2021)
management of certain patient
groups and for producing valuable
results. Pharmaceutical companies
must tap into the power of
blockchain infrastructure to collect
real-time data, providing patients
with customized prescription drugs
and services. This readily available
data streamlines the work of
chemists and enables them to offer
expert guidance on medication usage
to patients. Wearable technology
plays a crucial role in collecting
real-time data on a patient’s
condition and alerting specialists of
any emergencies.
Healthcare Computational Intelligence and Blockchain 163
11.6 CONCLUSION
Though it is still not widely used across many industries, blockchain is a relatively
new technology that is steadily gaining popularity. Blockchain has the potential to
grow into a potent tool for data democratization that will promote openness and
ethical business practices if it is more widely adopted. And as a result of speedier
transactions, increased transparency, security, and cost savings, blockchain technol-
ogy is finding more and more uses around the globe. Due to its built-in encryp-
tion and decentralization, blockchain technology has creative uses in the healthcare
industry. It increases the safety of patients’ electronic medical records, encourages
the monetization of health data, boosts interoperability across healthcare organiza-
tions, and aids in the development of anticounterfeit drug technologies. With the use
of blockchain technology, various facets of the healthcare industry could change;
among the most important uses of blockchain are the digital agreements made pos-
sible by intelligent contracts in the healthcare industry. Intelligent contracts will cut
expenses by getting rid of intermediaries from the payment chain. The adoption of
related cutting-edge technologies in the ecosystem has a substantial impact on block-
chain’s potential in the healthcare sector. It covers clinical studies, medication track-
ing, healthcare insurance, and system tracking. Using a blockchain framework and
device tracking, hospitals may map out their services throughout the course of their
full lifecycle.
REFERENCES
Agbo, C., Mahmoud, Q., & Eklund, J. (2019). Blockchain technology in healthcare: A sys-
tematic review. Healthcare, 7(2), 56. https://doi.org/10.3390/healthcare7020056
Aggarwal, S., Kumar, N., Alhussein, M., & Muhammad, G. (2021). Blockchain-based UAV
path planning for healthcare 4.0: Current challenges and the way ahead. IEEE Net‑
work, 35(1), 20–29. https://doi.org/10.1109/mnet.011.2000069
Assaye, B. T., Manaye, T., Regasa, Z., Hayiley, G., Biruk, K., Mesert, M., & Alamneh, B. E.
(2021). Perception and associated factors for the implementation of telemedicine dur-
ing COVID-19 pandemic among health professionals working at the government health
facility in a resource-limited setting, Ethiopia, 2021: A cross-section study. https://doi.
org/10.21203/rs.3.rs-464595/v1
Assaye, B. T., & Shimie, A. W. (2022). Telemedicine use during COVID-19 pandem-
ics and associated factors among health professionals working in health facilities at
resource-limited setting 2021. Informatics in Medicine Unlocked, 33, 101085. https://
doi.org/10.1016/j.imu.2022.101085
Healthcare Computational Intelligence and Blockchain 165
Ayub Khan, A., Wagan, A. A., Laghari, A. A., Gilal, A. R., Aziz, I. A., & Talpur, B. A. (2022).
BIoMT: A state-of-the-art consortium serverless network architecture for healthcare
systems using blockchain smart contracts. IEEE Access, 10, 78887–78898. https://doi.
org/10.1109/access.2022.3194195
Bali, V., Bali, S., Gaur, D., Rani, S., & Kumar, R. (2023). Commercial-off-the shelf vendor
selection: A multi-criteria decision-making approach using intuitionistic fuzzy sets and
TOPSIS. Operational Research in Engineering Sciences: Theory and Applications, 1,
25–45.
Bansal, P., Bhambri, P., & Gupta, O.P. (2012a). GOR Method to Predict Protein Secondary
Structure using Different Input Formats. Paper presented at the International Conference
on Advanced Computing and Communication Technologies (Sponsored by IEEE Com-
puter Society Chapter, Delhi Section and IETE Delhi), 80–83.
Bansal, P., Bhambri, P., & Kaur, J. (2012b). Secondary Structure Prediction of Amino Acids.
Paper presented at the International Conference on Sports Biomechanics, Emerging
Technologies and Quality Assurance in Technical Education, 397–399.
Bhambri, P., & Gupta, O. P. (2013a). KPO success in India. Journal of Policy and Organisa‑
tional Management, 3(1), 30. Bioinfo Publications.
Bhambri, P., & Gupta, O. P. (2013b). A survey of HPC applications appropriate for execution
on DSM and grid system. PIMT Journal of Research, 5(2), 83–87.
Bhambri, P., Singh, M., Dhanoa, I. S., & Kumar, M. (2022). Deployment of ROBOT for HVAC
duct and disaster management. Oriental Journal of Computer Science and Technology, 15.
Bhuvana, R., & Aithal, P. S. (2022). Investors’ behavioral intention of cryptocurrency
adoption—a review-based research agenda. International Journal of Applied Engineer‑
ing and Management Letters, 126–148. https://doi.org/10.47992/ijaeml.2581.7000.0125
Bilal, M., Kumari, B., & Rani, S. (2021, May). An artificial intelligence supported E-com-
merce model to improve the export of Indian handloom and handicraft products in the
World. In Proceedings of the International Conference on Innovative Computing &
Communication (ICICC). http://dx.doi.org/10.2139/ssrn.3842663
Chanda, J. N., Chowdhury, I. A., Peyaru, M., Barua, S., Islam, M., & Hasan, M. (2021).
Healthcare monitoring system for dedicated COVID-19 hospitals or isolation
centers. 2021 IEEE Mysore Sub Section International Conference (MysuruCon). https://
doi.org/10.1109/mysurucon52639.2021.9641728
Chauhan, M., & Rani, S. (2021). Covid-19: A revolution in the field of education in
India. Learning How to Learn Using Multimedia, 23–42.
De Aguiar, E. J., Faiçal, B. S., Krishnamachari, B., & Ueyama, J. (2020). A survey of block�-
chain-based strategies for healthcare. ACM Computing Surveys, 53(2), 1–27. https://doi.
org/10.1145/3376915
Dhanalakshmi, R., Vijayaraghavan, N., Sivaraman, A. K., & Rani, S. (2022). Epidemic aware-
ness spreading in smart cities using the artificial neural network. In AI-Centric Smart
City Ecosystems (pp. 187–207). CRC Press.
Ejaz, M., Kumar, T., Kovacevic, I., Ylianttila, M., & Harjula, E. (2021). Health blockage:
Blockchain-edge framework for reliable low-latency digital healthcare applications. Sen‑
sors, 21(7), 2502. https://doi.org/10.3390/s21072502
Goyal, F., Bhambri, P., & Bansal, P. (2012). Accuracy of Phylogenetic Trees using Distance
based Methods. Paper presented at the International Conference on Sports Biomechan-
ics, Emerging Technologies and Quality Assurance in Technical Education, 400–403.
Gupta, O. P., & Bhambri, P. (2012). Protein secondary structure prediction. PCTE Journal of
Computer Sciences, 6(2), 39–44.
Hussien, H. M., Yasin, S. M., Udzir, N. I., Ninggal, M. I., & Salman, S. (2021). Blockchain
technology in the healthcare industry: Trends and opportunities. Journal of Industrial
Information Integration, 22, 100217. https://doi.org/10.1016/j.jii.2021.100217
166 Computational Intelligence in Biomedical and Health Informatics
Imperius, N. P., & Alahmar, A. D. (2022). Systematic mapping of testing smart contracts for
blockchain applications. IEEE Access, 10, 112845–112857. https://doi.org/10.1109/
access.2022.3216874
Javaid, M., Haleem, A., Vaishya, R., & Vaish, A. (2020). Role of the internet of things
for health-care monitoring during the COVID-19 pandemic. Apollo Medicine, 0(0),
0. https://doi.org/10.4103/am.am_66_20
Kataria, A., Agrawal, D., Rani, S., Karar, V., & Chauhan, M. (2022). Prediction of blood
screening parameters for preliminary analysis using neural networks. In Predictive Mod‑
eling in Biomedical Data Mining and Analysis (pp. 157–169). Academic Press.
Kataria, A., Puri, V., Pareek, P. K., & Rani, S. (2023, July). Human activity classification
using G-XGB. In 2023 International Conference on Data Science and Network Security
(ICDSNS) (pp. 1–5). IEEE.
Kaur, A., Bhambri, P., & Gupta, O. P. (2012b). A novel technique for robust image segmenta-
tion. International Journal of Advanced Engineering Technology, 3(4), 110–114.
Kaur, D., Singh, B., & Rani, S. (2023). Cyber security in the metaverse. In Handbook of Research
on AI-Based Technologies and Applications in the Era of the Metaverse (pp. 418–435).
IGI Global.
Kaur, J., Bhambri, P., & Gupta, O. P. (2012a). Analyzing the phylogenetic trees with tree-
building methods. Indian Journal of Applied Research, 1(7), 83–85.
Kaur, S., Kumar, R., Kaur, R., Singh, S., Rani, S., & Kaur, A. (2022). Piezoelectric materials
in sensors: Bibliometric and visualization analysis. Materials Today: Proceedings, 65,
3780–3786. https://doi.org/10.1016/j.matpr.2022.06.484
Khang, A., Bhambri, P., Rani, S., & Kataria, A., Khang, A., & Sivaraman, A. K. (2022). Big
Data, Cloud Computing and Internet of Things Tools and Applications (1st ed.). Chap-
man & Hall.
Khatoon, A. (2020). A blockchain-based smart contract system for healthcare manage-
ment. Electronics, 9(1), 94. https://doi.org/10.3390/electronics9010094
Kumar, P., Banerjee, K., Singhal, N., Kumar, A., Rani, S., Kumar, R., & Lavinia, C. A. (2022).
Verifiable, secure mobile agent migration in healthcare systems using a polynomial-based
threshold secret sharing scheme with a blowfish algorithm. Sensors, 22(22), 8620.
Kumar, R., Rani, S., & Khangura, S. S. (Eds.). (2023). Machine Learning for Sustainable
Manufacturing in Industry 4.0: Concept, Concerns and Applications. CRC Press.
Mackey, T. K., Kuo, T., Gummadi, B., Clauson, K. A., Church, G., Grishin, D., Obbad, K.,
Barkovich, R., &Palombini, M. (2019). ‘Fit-for-purpose?’—challenges and opportuni-
ties for applications of blockchain technology in the future of healthcare. BMC Medi‑
cine, 17(1). https://doi.org/10.1186/s12916-019-1296-7
Onik, M. M., Aich, S., Yang, J., Kim, C., & Kim, H. (2019). Blockchain in healthcare: Chal-
lenges and solutions. Big Data Analytics for Intelligent Healthcare Management, 197–
226. https://doi.org/10.1016/b978-0-12-818146-1.00008-8
Paika, V., & Bhambri, P. (2013). Edge detection technique based on fuzzy logic. International
Journal of Mathematics and Computer Research, 1(3), 83–87.
Prerna, P., Bhambri, P., & Gupta, O. P. (2012). Multiple sequence alignment of different spe-
cies. Indian Journal of Applied Research, 1(7), 78–82.
Puri, V., Kataria, A., Rani, S., & Pareek, P. K. (2023, September). DLT based smart medical
ecosystem. In 2023 International Conference on Network, Multimedia and Information
Technology (NMITCON) (pp. 1–6). IEEE.
Puri, V., Kataria, A., Solanki, V. K., & Rani, S. (2022, December). AI-based botnet attack
classification and detection in IoT devices. In 2022 IEEE International Conference on
Machine Learning and Applied Network Technologies (ICMLANT) (pp. 1–5). IEEE.
Rachna, Bhambri, P., & Chhabra, Y. (2022). Deployment of distributed clustering approach
in WSNs and IoTs. In Cloud and Fog Computing Platforms for Internet of Things
(pp. 85–98). Chapman and Hall/CRC. https://doi.org/10.1201/9781003213888-7
Healthcare Computational Intelligence and Blockchain 167
Rachna, Chhabra, Y., & Bhambri, P. (2020). Comparison of clustering approaches for enhanc-
ing sustainability performance in WSNs: A study. In Proceedings of the International
Congress on Sustainable Development Through Engineering Innovations (pp. 62–71).
Excel India Publishers, New Delhi. ISBN: 978-93-89947-14-4
Rachna, Chhabra, Y., & Bhambri, P. (2021). Various approaches and algorithms for monitor-
ing the energy efficiency of wireless sensor networks. Lecture Notes in Civil Engineer‑
ing, 113, 761–770. https://doi.org/10.1007/978-981-15-9554-7_68
Rana, R. (2018, March). A review of the evolution of wireless sensor networks. International
Journal of Advanced Research Trends in Engineering and Technology (IJARTET),
5(Special issue). ISSN2394-3777 (Print), ISSN2394-3785 (Online). www.ijartet.com
Rana, R., Chhabra, Y., & Bhambri, P. (2019). A review on development and challenges in wire�-
less sensor networks. In International Multidisciplinary Academic Research Conference
(IMARC, 2019) (pp. 184–188). CT University Publications. ISBN: 978-81-942282-0-2
Rana, R., Chhabra, Y., & Bhambri, P. (2021a). Comparison and evaluation of various QoS
parameters in WSNs with the implementation of enhanced low energy adaptive efficient
distributed clustering approach. Webology, 18(1). ISSN: 1735-188X
Rana, R., Chhabra, Y., & Bhambri, P. (2021b). Design and development of distributed cluster�-
ing approach in wireless sensor network. Webology, 18(1). ISSN: 1735-188X
Rani, S., Bhambri, P., & Kataria, A. (2023). Integration of IoT, big data, and cloud computing
technologies. Big Data, Cloud Computing, and IoT: Tools and Applications (1st ed.,
pp. 1–21). Chapman and Hall/CRC.
Rani, S., Bhambri, P., Kataria, A., & Khang, A. (2023). Smart city ecosystem: Concept,
sustainability, design principles, and technologies. In AI-Centric Smart City Ecosys‑
tems (pp. 1–20). CRC Press.
Rani, S., Kataria, A., & Chauhan, M. (2022). Cyber security techniques, architectures, and design.
In Holistic Approach to Quantum Cryptography in Cyber Security (pp. 41–66). CRC Press.
Rani, S., Kataria, A., Kumar, S., & Tiwari, P. (2023). Federated learning for secure IoMT-
applications in smart healthcare systems: A comprehensive review. Knowledge-Based
Systems, 110658.
Rani, S., Kumar, S., Kataria, A., & Min, H. (2023). SmartHealth: An intelligent framework to
secure IoMT service applications using machine learning. ICT Express, 48, 1–6.
Rani, S., Mishra, A. K., Kataria, A., Mallik, S., & Qin, H. (2023). Machine learning-based
optimal crop selection system in smart agriculture. Scientific Reports, 13(1), 15997.
Rani, S., Pareek, P. K., Kaur, J., Chauhan, M., & Bhambri, P. (2023). Quantum Machine Learn-
ing in Healthcare: Developments and Challenges. Paper presented at the International
Conference on Integrated Circuits and Communication Systems, 1–7.
Ritu, P., & Bhambri, P. (2023, February 17). Software effort estimation with machine
learning—a systematic literature review. In Agile Software Development: Trends, Chal‑
lenges and Applications (pp. 291–308). John Wiley & Sons, Inc.
Safi, Z., Abd-Alrazaq, A., Khalifa, M., &Househ, M. (2020). Technical aspects of develop-
ing chatbots for medical applications: A scoping review. Journal of Medical Internet
Research, 22(12), e19127. https://doi.org/10.2196/19127
Soltanisehat, L., Alizadeh, R., Hao, H., & Choo, K. R. (2023). Technical, temporal, and spatial
research challenges and opportunities in blockchain-based healthcare: A systematic liter-
ature review. IEEE Transactions on Engineering Management, 70(1), 353–368. https://
doi.org/10.1109/tem.2020.3013507
Sudevan, S., Barwani, B., Al Maani, E., Rani, S., & Sivaraman, A. K. (2021). Impact of blended
learning during Covid-19 in Sultanate of Oman. Annals of the Romanian Society for Cell
Biology, 14978–14987.
Sun, Z., Chen, Z., Cao, S., & Ming, X. (2022). Potential requirements and opportunities of
blockchain-based industrial IoT in the supply chain: A survey. IEEE Transactions on Com‑
putational Social Systems, 9(5), 1469–1483. https://doi.org/10.1109/tcss.2021.3129259
168 Computational Intelligence in Biomedical and Health Informatics
Tanwar, R., Chhabra, Y., Rattan, P., & Rani, S. (2022, September). Blockchain in IoT networks
for precision agriculture. In International Conference on Innovative Computing and
Communications: Proceedings of ICICC 2022 (Vol. 2, pp. 137–147). Springer Nature.
Tanwar, S., Parekh, K., & Evans, R. (2020). Blockchain-based electronic healthcare record
system for healthcare 4.0 applications. Journal of Information Security and Applica‑
tions, 50, 102407. https://doi.org/10.1016/j.jisa.2019.102407
Wu, G., Wang, S., Ning, Z., & Zhu, B. (2022). Privacy-preserved electronic medical record
exchanging and sharing: A blockchain-based smart healthcare system. IEEE Jour‑
nal of Biomedical and Health Informatics, 26(5), 1917–1927. https://doi.org/10.1109/
jbhi.2021.3123643
12 Intelligent Development
in Healthcare With
the Internet
Shivmanmeet Singh and Harmandeep Kaur
12.1 INTRODUCTION
Using the Internet of Things (IoT) plays a significant role in advancing health science
and technology, as demonstrated by the history of human progress. Humanity has
dreamed about ways to diagnose and treat illnesses remotely since the beginning
(Puri et al., 2023, September). The introduction of 5G, also known as fifth-generation
network technology, makes it possible to interact with healthcare professionals any-
time. Fifth-generation has influenced the development of intelligent domains and has
given rise to the idea of the IoT (Quy et al., 2023; Mukherjee et al., 2018; Abbas et al.,
2018). Healthcare and medicine are two of these fields that are becoming import-
ant. The creation and accomplishments of remote electronic health systems have
achieved several beneficial outcomes in recent decades (Statista, 2023; Vodafone,
2023). The cloud is where computation, processing, and storage are housed. Cloud
computing (CC), a new technology, is stable, dependable, and has a sizable computa-
tional capacity (Mahmoud et al., 2019). Although CC offers many benefits, one major
drawback is the lengthy service response time (Habibzadeh et al., 2020). It cannot be
used in real-time healthcare applications as a result. The merging of different IOT
technologies has recently been advocated as a solution.
Figure 12.1 depicts the keywords associated with wearable medical sensor.
Different technologies aim to remove connectivity and ease-of-use problems
between users and cloud resources (Kaur et al., 2023). Technology enhances reliabil-
ity while reducing interconnection time, power dissipation, and computing expenses.
This industry anticipated $75 billion in the next three years, per Statista’s projection
(Alshehri & Muhammad, 2021). Additionally, an intercommunication poll reveals
that over one-third (approximately) seek to maintain their health. According to the
report, 60% of people use smart devices surfing for health issues like fever and
COVID (John Dian et al., 2020). These findings demonstrate how IoT and real-time
computing are critical in healthcare (Dhanalakshmi et al., 2022). Nowadays, crucial
IOT-based health data in recent years resides with telemedicine, which can fill the
gap between rural and urban health (Qadri et al., 2020). It offers low-cost diagnos-
tics, remote examination, and consultation. Telemedicine can enable the top medi-
cal professionals to reach the most remote locations and affordably offer everyone
cutting-edge medical treatment (Ullah et al., 2021).
12.2.1 Smart Sensors
An intelligent sensor is a gadget that provides services to users for automatically
gathering information during chemical and physical switching from the attached
gadget (Adavoudi Jolfaei et al., 2021; Dong & Yao, 2021; Taimoor & Rehman, 2022).
This provides very accurate data collection.
We concentrate on wearable sensors in this work because of their broad utility.
Smart-wearing sensors can be strapped to the wrist, inserted into the body, or inte-
grated into garments (Barua et al., 2022; Aledhari et al., 2022; Ali et al., 2023; Singh
et al., 2022). In the context of intelligent healthcare, gadgets monitor patients’ vital
signs and send data wirelessly or through wired network connections to calculat-
ing servers (Rani et al., 2023). The creation of several wearable items has recently
received attention (Seneviratne et al., 2017), including eyeglasses, armbands, and
gadgets worn on different body parts, as shown in Figure 12.2. The authors (Krichen,
2021; Majumder & Deen, 2019) provide workable approaches for deploying these
sensors connected with smartphones to identify anomalous input in this industry.
Intelligent Development in Healthcare With the Internet 171
12.2.1.1 Pulse
A pulse sensor keeps track of a person’s heartbeat and can be used to identify emer-
gencies, including cardiac arrest and pulmonary embolism. The wrist, earlobe, chest,
fingertip, and other areas are possible locations for the pulse signal to be implanted
(Gubbi & Amrutur, 2015; Quy et al., 2022; Paika & Bhambri, 2013a; Hu et al., 2021;
Al_Barazanchi et al., 2017). Although installing the pulse sensors at the earlobe
and fingertip positions is challenging, these locations provide exact signals. Sensors
mounted on the wrist are frequently more practical and durable.
172 Computational Intelligence in Biomedical and Health Informatics
12.2.1.5 Oxygen
The amount of oxygen in the appropriate diagnosis of the body’s oxygen supply
level helps medical professionals diagnose the body’s level of oxygen supply (Rani
et al., 2023). However, the high power requirement due to the use of infrared LEDs
is a significant drawback. Poly-L-Lysine (PLL) (Bansal et al., 2022) was presented
as a solution. According to the findings, employing PLL provides six times better
results concerning power consumption. In order to provide patients with the most
intelligent medical services possible, the data is transceived between user appli-
cations, servers, and particular cloud storage. We will discuss a few cutting-edge
Internet of Health Things (IoHT) computing technologies in the next section (Xi
et al., 2022). Working scenarios between the patient and doctor in telemedicine are
shown in Figure 12.3.
12.4 TELEMEDICINE
Telemedicine is described by the World Health Organization (WHO) as “the delivery
of healthcare services, where distance is a critical factor, by all healthcare profes-
sionals using information and communication technologies for the exchange of valid
information for diagnosis, treatment, and prevention of disease and injuries, research
and evaluation, and for the continuing education of healthcare providers, all in the
interests of advancing the health of individuals and their communities (Hossain
et al., 2019). Patient and doctor connection is shown in the form of flowchart in the
Figure 12.6.
12.4.1 Utility of Telemedicine
Remote regions are easily accessible.
Home health and precautions (ambulance) are available.
Connectivity between both user and doctor is enhanced when they are far away.
Monitoring and actions are instantaneous when the transfer is possible.
Medical research on patients is improved.
Public’s awareness of patient condition is enhanced.
Can be used as a disaster action tool management device.
Complex diseases are interpreted instantly.
Communication between the user and doctor will hopefully improve actual
precautions.
It offers the chance for fairness in the delivery of medical care in different
regions.
Telementored procedures—surgery employing hand robots—are possible
(Chen et al., 2019, 2020; Kim & Ben-Othman, 2020; Noorbakhsh-Sabet
et al., 2019)
12.4.2 Types of Technology
Two fundamental kinds of technology are used in most modern telemedicine appli-
cations. The first is the store and forward technique, which transports digital images
(Reddy et al., 2019). Using a camera, a digital image is “stored” and then “trans-
ported” by a smart device. Telepathology, teledermatology, and teleradiology are the
methods that perform this task accurately and precisely (Nguyen et al., 2023). The
second widely utilized system is one-to-one communication, which leans toward live
consultations using video calls. The patient user’s helping hand may be included;
this can be any person, a relative or someone else, sometimes a nurse practitioner,
telemedicine coordinator, or anyone present at the place of origin (Iqbal et al., 2020).
Thanks to video/audio conferencing technology, a “real-time” consultation may be
conducted at both locations (Zhou et al., 2019). Support for this consultation has been
found across almost all medical specialties (Figure 12.7).
12.4.3 Infrastructural System
There are three types of telemedicine centers.
REFERENCES
Abbas, N.; Zhang, Y.; Taherkordi, A.; Skeie, T. Mobile Edge Computing: A Survey. IEEE
Internet of Things Journal 2018, 5, 450–465.
Abbate, S.; Centobelli, P.; Cerchione, R.; Oropallo, E.; Riccio, E. A First Bibliometric Liter��-
ature Review on Metaverse. In Proceedings of the IEEE Technology and Engineering
Management Conference (TEMSCON EUROPE), Izmir, Turkey, 25–29 April 2022;
pp. 254–260.
Adavoudi Jolfaei, A.; Aghili, S.F.; Singelee, D. A Survey on Blockchain-Based IoMT Systems:
Towards Scalability. IEEE Access 2021, 9, 148948–148975.
Al_Barazanchi, I.; Shibghatullah, A.S.; Selamat, S.R. A New Routing Protocols for Reducing
Path Loss in Wireless Body Area Network (WBAN). Journal of Telecommunication,
Electronic and Computer Engineering 2017, 9, 93–97.
Aledhari, M.; Razzak, R.; Qolomany, B.; Al-Fuqaha, A.; Sales, F. Biomedical IoT: Enabling
Technologies, Architectural Elements, Challenges, and Future Directions. IEEE Access
2022, 11, 31306–31339.
Ali, M.; Naeem, F.; Tariq, M.; Kaddoum, G. Federated Learning for Privacy Preservation in
Smart Healthcare Systems: A Comprehensive Survey. IEEE Journal of Biomedical and
Health Informatics 2023, 27, 778–789.
Alshehri, F.; Muhammad, G. A Comprehensive Survey of the Internet of Things (IoT) and
AI-Based Smart Healthcare. IEEE Access 2021, 9, 3660–3678.
Amin, S.U.; Hossain, M.S. Edge Intelligence and Internet of Things in Healthcare: A Survey.
IEEE Access 2021, 9, 45–59.
Bansal, G.; Rajgopal, K.; Chamola, V.; Xiong, Z.; Niyato, D. Healthcare in Metaverse:
A Survey on Current Metaverse Applications in Healthcare. IEEE Access 2022, 11,
119914–119946.
Barua, A.; Al Alamin, M.A.; Hossain, M.S.; Hossain, E. Security and Privacy Threats for Blue��-
tooth Low Energy in IoT and Wearable Devices: A Comprehensive Survey. IEEE Open
Journal of the Communications Society 2022, 3, 251–281.
Bhatia, H.; Panda, S.N.; Nagpal, D. Internet of Things and its Applications in Healthcare-A
Survey. In Proceedings of the International Conference on Reliability, Infocom Tech-
nologies and Optimization (Trends and Future Directions) (ICRITO), Noida, India, 4–5
June 2020; pp. 305–312.
182 Computational Intelligence in Biomedical and Health Informatics
Kaur, D.; Singh, B.; Rani, S. Cyber Security in the Metaverse. In Handbook of Research on
AI-Based Technologies and Applications in the Era of the Metaverse (pp. 418–435). IGI
Global; 2023.
Kaur, P.; Bhambri, P. Review of Zero Watermarking Algorithms for Text Documents. PCTE
Journal of Computer Sciences 2013, 10(1), 77–82.
Khan, M.; Jilani, M.T.; Khan, M.K.; Bin Ahmed, M. A Security Framework for Wireless Body
Area Network Based Intelligent Healthcare System. CEUR Workshop Proceedings
2017, 1852, 80–85.
Kim, H.; Ben-Othman, J. Toward Integrated Virtual Emotion System with AI Applicability for
Secure CPS-Enabled Smart Cities: AI-Based Research Challenges and Security Issues.
IEEE Network 2020, 34, 30–36.
Krichen, M. Anomalies Detection Through Smartphone Sensors: A Review. IEEE Sensors
Journal 2021, 21, 7207–7217.
Laijawala, V.; Aachaliya, A.; Jatta, H.; Pinjarkar, V. Classification Algorithms based Mental
Health Prediction using Data Mining. In Proceedings of the International Conference
on Communication and Electronics Systems (ICCES), Coimbatore, India, 21–22 Octo-
ber 2020; pp. 1174–1178.
Lanubile, F.; Calefato, F.; Quaranta, L.; Amoruso, M.; Fumarola, F.; Filannino, M. Towards
Productizing AI/ML Models: An Industry Perspective from Data Scientists. In Proceed-
ings of the IEEE/ACM 1st Workshop on AI Engineering—Software Engineering for AI
(WAIN), Madrid, Spain, 30–31 May 2021; pp. 129–132.
Lin, C.-H.; Chan, S.-B.; Lai, Y.-C.; Liang, W.-L.; Huang, M.-S.; Chen, Y.-Y. AI in eHealth:
Diagnosis of Parkinson’s Disease with Augmented Reality. In Proceedings of the IEEE
International Conference on Consumer Electronics-Taiwan (ICCE-TW), Penghu, Tai-
wan, 15–17 September 2021; pp. 1–2.
Lin, K.; Liu, J.; Goa, J. AI-Driven Decision Making for Auxiliary Diagnosis of Epidemic Dis��-
eases. IEEE Transactions on Molecular, Biological and Multi-Scale Communications
2022, 8, 9–16.
Lins, F.A.; Vieira, M. Security Requirements and Solutions for IoT Gateways: A Comprehen��-
sive Study. IEEE Internet of Things Journal 2021, 8, 8667–8679.
Lu, M. AI-Based Tank Truck Cleaning Robot. In Proceedings of the IEEE International Con��-
ference on Advances in Electrical Engineering and Computer Applications (AEECA),
Dalian, China, 20–21 August 2022; pp. 1197–1202.
Mahmoud, M.M.E.; Rodrigues, J.J.P.C.; Saleem, K. Cloud of Things for Healthcare: A Survey from
Energy Efficiency Perspective. In Proceedings of the International Conference on Computer
and Information Sciences (ICCIS), Sakaka, Saudi Arabia, 3–4 April 2019; pp. 1–7.
Majumder, S.; Deen, M.J. Smartphone Sensors for Health Monitoring and Diagnosis. Sensors
2019, 19, 2164.
Malamas, V.; Chantzis, F.; Dasaklis, T.K.; Stergiopoulos, G.; Kotzanikolaou, P.; Douligeris,
C. Risk Assessment Methodologies for the Internet of Medical Things: A Survey and
Comparative Appraisal. IEEE Access 2021, 9, 40049–40075.
Mukherjee, M.; Shu, L.; Wang, D. Survey of Fog Computing: Fundamental, Network Appli��-
cations, and Research Challenges. IEEE Communications Surveys and Tutorials 2018,
20, 1826–1857.
Nguyen, D.C.; Pathirana, P.N.; Ding, M.; Seneviratne, A. BEdgeHealth: A Decentralized
Architecture for Edge-Based IoMT Networks Using Blockchain. IEEE Internet of
Things Journal 2021, 8, 11743–11757.
Nguyen, D.C.; Nguyen, V.D.; Ding, M.; Chatzinotas, S.; Pathirana, P.N.; Seneviratne, A.;
Dobre, O.; Zomaya, A.Y. Intelligent blockchain based edge computing via deep rein-
forcement learning: Solutions and Challenges. IEEE Network 2022, 36, 12–19.
Nguyen, D.C.; Pham, Q.V.; Pathirana, P.N.; Ding, M.; Seneviratne, A.; Lin, Z.; Dobre, O.;
Hwang, W.J. Federated Learning for Smart Healthcare: A Survey. ACM Computing Sur‑
veys 2023, 55, 60.
184 Computational Intelligence in Biomedical and Health Informatics
Ning, H.; Wang, H.; Lin, Y.; Wang, W.; Dhelim, S.; Farha, E.; Ding, J.; Daneshmand, M.
A Survey on Metaverse: The State-of-the-Art, Technologies, Applications, and Chal-
lenges. arXiv 2021, arXiv: 2112.09673. https://arxiv.org/abs/2111.09673
Noorbakhsh-Sabet, N.; Zand, R.; Zhang, Y.; Abedi, V. Artificial Intelligence Transforms the
Future of Health Care. The American Journal of Medicine 2019, 132, 795–801.
Paika, V.; Bhambri, P. Face Recognition using Fuzzy Inference System. International Journal
of Computers and Technology 2013a, 8(3), 887–897.
Paika, V.; Bhambri, P. Fuzzy System based Edge Extraction Techniques using Device-
Dependent Color Spaces. International Journal of Scientific & Engineering Research
2013b, 4(8), 1467–1478.
Puri, V.; Kataria, A.; Rani, S.; Pareek, P.K. DLT Based Smart Medical Ecosystem. In 2023
International Conference on Network, Multimedia and Information Technology (NMIT‑
CON) (pp. 1–6). IEEE; September 2023.
Qadri, Y.A.; Nauman, A.; Zikria, Y.B.; Vasilakos, A.V.; Kim, S.W. The Future of Healthcare
Internet of Things: A Survey of Emerging Technologies. IEEE Communications Surveys
and Tutorials 2020, 22, 1121–1167.
Quy, V.K.; Van-Hau, N.; Anh, D.V.; Ngoc, L.A. Smart Healthcare IoT Applications Based
on Fog Computing: Architecture, Applications, and Challenges. Complex & Intelligent
Systems 2022, 8, 3805–3815.
Quy, V.K.; Van-Hau, N.; Quy, N.M.; Anh, D.V.; Ngoc, L.A.; Chehri, A. An Efficient Edge
Computing Management Mechanism for Sustainable Smart Cities. Sustainable Comput‑
ing: Informatics and Systems 2023, 37, 110867.
Rani, S.; Kumar, S.; Kataria, A.; Min, H. SmartHealth: An Intelligent Framework to Secure
IoMT Service Applications Using Machine Learning. ICT Express 2023, 48, 1–6.
Rani, S.; Mishra, A.K.; Kataria, A.; Mallik, S.; Qin, H. Machine Learning-Based Optimal Crop
Selection System in Smart Agriculture. Scientific Reports 2023, 13(1), 15997.
Rathore, M.M.; Ahmad, A.; Paul, A.; Wan, J.; Zhang, D. Real-Time Medical Emergency
Response System: Exploiting IoT and Big Data for Public Health. Journal of Medical
Systems 2016, 40, 283.
Reddy, S.; Fox, J.; Purohit, M.P. Artificial Intelligence-Enabled Healthcare Delivery. Journal
of the Royal Society of Medicine 2019, 112, 22–28.
Seneviratne, S.; Hu, Y.; Nguyen, T.; Lan, G.; Khalifa, S.; Thilakarathna, K.; Hassan, M.;
Seneviratne, A. A Survey of Wearable Devices and Challenges. IEEE Communications
Surveys and Tutorials 2017, 19, 2573–2620.
Shanin, F.; Das, H.A.; Krishnan, G.A.; Neha, L.S.; Thaha, N.; Aneesh, R.P.; Embrandiri, S.;
Jayakrishan, S. Portable, and Centralised E-Health Record System for Patient Monitor-
ing Using Internet of Things (IoT). In Proceedings of the International CET Conference
on Control, Communication, and Computing (IC4), Thiruvananthapuram, India, 5–7
July 2018; pp. 165–170.
Sharma, M.; Bhambri, P. A Comparative Study of GENE Prediction Program of Metagen��-
omic Data. International Journal for Science and Engineering Technologies with Latest
Trends 2013, 11(1), 1–5.
Singh, S.; Grewal, N.S.; Kaur, B. Development and Analysis of High-Speed Single-Channel
ISOWC Transmission Link using a Spectrally Efficient Higher-Order Modulation For-
mat. ICTACT 1 December 2022, 13(4).
Singh, S.; Grewal, N.S.; Kaur, B. Performance Investigation and Development of 112 gbit/s
Dual Polarization 16 QAM Transmission System using Differential Encoding. Optical
and Quantum Electronics January 2023, 55(1), 70.
Singh, S.; Kakkar, P.; Bhambri, P. A Study of the Impact of Random Waypoint and Vector
Mobility Models on Various Routing Protocols in MANET. International Journal of
Advances in Computing and Information Technology, 2013, 2(3), 41–51.
Intelligent Development in Healthcare With the Internet 185
Slater, M.; Gonzalez-Liencres, C.; Haggard, P.; Vinkers, C.; Gregory-Clarke, R.; Jelley, S.;
Watson, Z.; Breen, G.; Schwarz, R.; Steptoe, W.; Szostak, D. The Ethics of Realism in
Virtual and Augmented Reality. Frontiers in Virtual Reality 2020, 1, 1.
Statista. 2023. www.statista.com/statistics/471264/iot-number-of-connected-devices-world-
wide (accessed on 1 February 2023).
Swaroop, K.N.; Chandu, K.; Gorrepotu, R.; Deb, S. A Health Monitoring System for Vital
Signs using IoT. Internet of Things 2019, 5, 116–129.
Taimoor, N.; Rehman, S. Reliable and Resilient AI and IoT-Based Personalised Healthcare
Services: A Survey. IEEE Access 2022, 11, 535–563.
Ullah, A.; Azeem, M.; Ashraf, H.; Alaboudi, A.A.; Humayun, M.; Jhanjhi, N. Secure Health��-
care Data Aggregation and Transmission in IoT–A Survey. IEEE Access 2021, 9,
16849–16865.
Vodafone. 2023. www.vodafone.com/business/news-and-insights/white-paper/global-trends-
barometer-2019 (accessed on 1 February 2023).
Xi, N.; Chen, J.; Gama, F.; Riar, M.; Hamari, J. The Challenges of Entering the Metaverse:
An Experiment on the Effect of Extended Reality on Workload. Information Systems
Frontiers 2022, 25, 659–680.
Xiao, Y.; Jia, Y.; Liu, C.; Cheng, X.; Yu, J.; Lv, W. Edge Computing Security: State of the Art
and Challenges. Proceedings of the IEEE 2019, 117, 1608–1631.
Yaqoob, I.; Salah, K.; Jayaraman, R.; Al-Hammadi, Y. Blockchain for Healthcare Data Man��-
agement: Opportunities, Challenges, and Future Recommendations. Neural Computing
and Applications 2022, 34, 11475–11490.
Yu, K.H.; Beam, A.L.; Kohane, I.S. Artificial Intelligence in Healthcare. Nature Biomedical
Engineering 2018, 2, 719–731.
Zhang, Y.; Dai, Z.; Zhang, L.; Wang, Z.; Chen, L.; Zhou, Y. Application of Artificial Intelli��-
gence in Military: From Projects View. In Proceedings of the International Conference on
Big Data and Information Analytics (BigDIA), Shenzhen, China, 4–6 December 2020;
pp. 113–116.
Zhou, W.; Jia, Y.; Peng, A.; Zhang, Y.; Liu, P. The Effect of IoT New Features on Security and
Privacy: New Threats, Existing Solutions, and Challenges Yet to Be Solved. IEEE Inter‑
net of Things Journal 2019, 6, 1606–1616.
13 Intelligent Development
in Healthcare With
the Internet
Case Study I
Utpal Ghosh and Uttam Kumar Mondal
13.1 INTRODUCTION
There are various applications comprising the investigation of acoustic data, such as
recording devices and portable devices, but this research has proposed a lightweight,
least-cost, and highest-quality acoustic recorder with restricted resources in con-
stricted environments. Over the previous few decades, a variety of sensing methods
to sense audio and various audio processing systems have been developed, but they
have always relied on high-throughput computing and/or an expansive microphone
array. Although microphone arrays outperform single-microphone systems, they have
several disadvantages due to the fixed position of the microphones and the fact that all
signal processing operations are handled by a centralized processor. Another option
is to deploy dispersed nodes with low-resource devices for sensing and different algo-
rithms to detect and localize various characteristics of acoustic events. This system
is beneficial because it is wireless and all the nodes are battery powered, so it is less
expansive and may be deployed in multiple types of settings. In recent days, wireless
acoustic sensor networks have become one of the most vibrant research topics, pro-
ducing various issues related to the communication of different working sensor nodes
(Kobo et al., 2017). This experiment aimed to monitor the health status of critical
patients centrally, especially in the COVID pandemic situation when not enough doc-
tors or medical personnel were available and had to maintain social distance. The aim
of this research work is to read the parameters for checking several health conditions
like pulse rate, heartbeat rate, systolic-diastolic blood pressure, ECG, etc. in the form
of an audio signal through various acoustic body sensors. The acoustic body sensing
equipment is microphone-oriented to capture the signals in audio format.
A wireless acoustic sensor network is an assembly of operating nodes formed in
a matching network. Every node consists of one or more microcontrollers with pro-
cessing capabilities such as audio capture devices, CPUs, and coordinator devices.
It can include a variety of memory types, such as local memory, databases, etc., and
may also have optimal power sources such as batteries, electricity, or solar cells, as
well as a variety of sensors and actuators. The essential concept of this network is
13.2 LITERATURE REVIEW
In healthcare settings, the combination of WSN with centralized support allows
patients to be taken care of and observed constantly, which can control any medi-
cal emergency. These options provide an uninterrupted medical service to patients
through the architecture of wireless networks. This infrastructure allows several
remote access points among different nodes. As a result, the status of patients can be
tracked from any place where community terminals are available. Almutari (2022)
proposed a tree-based routing protocol to solve the mobility management problem
that occurred in WSN. As part of this routing solution, a two-way uplink/down-
link connection is provided to mobile sensor nodes, and proactive methods are
used to accelerate the phase of association or reassociation. A WSN mobile solu-
tion (Abdulameer et al., 2020) was introduced over the 6LoWPAN network. The
author proposes a new protocol for the dynamic management of nodes for 6LoWPAN
(Kataria et al., 2023, July). This technique uses the technology of a proxy agent, and
the aim of this work is to increase the handoff time by quickly predicting the trans-
fer of events. This protocol is used to reduce the mobility of nodes in exchange for
mobility-related information.
An article by Morishima (2021) provides an overview of current research and
guiding principles for the advancement of wearable, implantable monitoring sys-
tems. It uses physiological data from patients to relay information to the intelligent
personal digital assistant (IPDA). The purpose of this chapter is to explain the impor-
tance of sensory networks in the treatment framework for reducing the dependency
of patients on other persons for care, also supporting chronically ill elderly people
who live an independent life, as well as aiming to provide suitable, satisfactory, and
hassle-free care to people. Chattu et al. (2019) introduce body location sensors that
permit healthcare tracking in an unfastened manner. The primary concept is to offer
an answer for internal monitoring of temperature primarily based on a novel intra-
frame sensor, verbal exchange, and computing device software. This new biosensor
can collect data that can be used to examine the relationship between temperature
variability and women’s fitness reputation. During pandemics, blockchain might
help hospitals and health organizations to handle data more efficiently (Katuwal
et al., 2018). It may also aid in the tracking of data for existing public health prob-
lems such as traffic accidents, illegal drug addiction, and so on (Upadhyay, 2020).
When blockchain technology is used in the public health arena, these networks could
potentially be able to share secure medical information as well as store this data for
healthcare organizations (Bhambri and Gupta, 2013c). Some researchers revealed a
blockchain-based strategy for determining harmful information and identifying the
population at risk from communication via the Internet. This demonstrates block-
chain’s potential to improve monitoring of public health in the digital age (Ali Alheeti
and Al-Ani, 2018). An improved and efficient method has been proposed in Ghosh
(2023) for analyzing various properties of an audio signal using mel-frequency cep-
stral coefficients, perceptual linear prediction cepstral coefficients, and modified
group delay feature technique, as well as drawing a comparison analysis among dif-
ferent traditional techniques, that is, discrete cosine transform, short-time fourier
transform, and modified discrete cosine transform and the proposed techniques.
Intelligent Development in Healthcare With the Internet 189
13.3 PROPOSED METHODOLOGY
In this technique, each acoustic body sensor is made up of a microcontroller, a coor-
dinator device, an audio board, an encapsulated audio sensor, and a battery. Multiple
acoustic body sensors are used to determine a patient’s various health statuses.
Generally, a coordinator device is used that has the capability to receive all possible
audio signals and transmit them through a wired/wireless link to a wireless sensor
network, which then travels to the central monitoring center through the Internet. In
this proposed architecture, the whole system is divided into three tiers. The first tier
is the Communication Tier 1 or Patient’s Data Collection (PDC). This tier collects
all required patient data using various body sensors and compiles it into the coor-
dinator device. The concept of a multidimensional signal (Rehan, 2018) has been
applied here to organize the patient’s data in the form of audio signals that arise from
multiple sensors or sources. The next tier is Communication Tier 2. In this tier, all
captured acoustic data is transferred to an application server (Apache web server) or
real-time communication server through a wireless sensor network using the Internet.
During the transmission of acoustic data from the coordinator device to the central
server through WSN, the multidimensional channel (Online Electronics, Electrical
Engineering Knowledge, 2018) technique is introduced to the WSN architecture so
that the signals can be transmitted uninterruptedly and also without interfering with
one another. Apache Web Server is a free source web server. It is compatible with any
website in any web browser with perfect power availability. Any type of program-
ming language can be programmed in Apache. An access point (AP) has been used
that allows the wired coordinator devices to connect to wireless devices. The last tier
is called Communication Tier 3, where all audio data is processed from the database
server and then shown through receivers or medical display coordinators at the cen-
tral monitoring center. To store the patient’s data in an organized manner and for
searching any information about a patient quickly, groupify the patient’s information
according to the mathematical procedure of symmetric or even antisymmetric or odd
signals. The groupification is done based on Eqn. (13.1) and (13.2).
where X(n) represents the value of signal for positive n, and X(−n) represents the value
of signal for negative n.
where X(n) is the positive signal value, and −X(−n) also represents the positive signal
value.
Blockchain provides a more secure, decentralized database that can function with-
out a centralized administrator. For secure data transmission, safe data transactions,
or alterations in real-time updates across the network, the present technique uses the
190 Computational Intelligence in Biomedical and Health Informatics
concepts of open access blockchain and limited access blockchain (Sharma et al.,
2019) according to the data and information accessibility among users. As a result,
the information saved in databases depends on their impact on privacy. Blockchain
eliminates the downfall of single-point failure, which is typical in traditional cen-
tralized database management systems (Vazirani et al., 2019). Therefore, in this pro-
posed approach, the decentralized network of the blockchain technique is adopted.
The data on this blockchain is stored on a network of individual machines that also
perform the job of recording and maintaining transaction records.
Blockchain technology is implemented into the health monitoring system at four
types of application levels.
13.3.3 Patient-Oriented Level
Blockchain technology has the potential to improve the management of logistical
and human resources in healthcare facilities. The use of blockchain can validate
the standards of quality at various supply chain management nodes and notify the
appropriate authorities about possible deviations (Tseng et al., 2018). The application
of blockchain can improve the efficiency of such processes and contribute to the
establishment of smarter health-care organizations.
systolic rate of blood flow >120 and diastolic rate of blood flow <80), the ECG
report shows abnormal plotting, etc. Then it displays a warning message. According
to the result of the abnormality, the doctors can take the necessary emergency action
without delay. All the data, including normal as well as abnormal data values, is
stored in the database server (MySQL). The application program interface (API) per-
forms as an interface between the hardware and software. Here the API is written on
PHP using sublime text.
Intelligent Development in Healthcare With the Internet 193
TABLE 13.1
Sample Pulse Rate Reading
Name of patient: Sample 1
Age: 37
Gender: Male
Pulse rate: 140 per min Display warning message
Name of patient: Sample 2
Age: 60
Gender: Female
Pulse rate: 72 per min Normal to reference range
TABLE 13.2
Sample Heartbeat Rate Reading
Name of patient: Sample 1
Age: 30
Gender: Male
Heartbeat rate: 112 beats per min Display warning message
FIGURE 13.4 Heartbeat rate reading for current heart rate value 112 BPM.
Table 13.2 presents the results values as expected of the proposed system for
heartbeat rate.
Based on this results data of the patient, according to the proposed system, the
display monitor shows a warning message because the results data value does not fall
within the medically designated reference range of the system. Figure 13.4 depicts a
graphic representation for this sample.
This simulation also takes an experiment to prove the correctness of our measure-
ment of heartbeat. When people exercise, the heart needs to pump faster and needs
more oxygen. This system considers three types of exercise: sprinting, jogging, and
walking. Among these types, sprint involves more movement, so the heart has to
pump faster and needs more oxygen.
Table 13.3 shows the reading values of a random patient during performing the
three types of exercise activity. The average heartbeat of the patient was measured
at 82 BPM.
The relationship between heartbeat rate and the types of exercise is that more
complex exercise requires more speed. As a result, the heart needs to pump more
Intelligent Development in Healthcare With the Internet 195
TABLE 13.3
Heartbeat Rate after Exercise (BPM).
Exercise Reading 1 Reading 2 Reading 3 Average
to deliver more oxygen. So, according to the table, after performing jumping jacks,
the patient’s heartbeat rate increased by 39 beats from his average heart rate. The
heartbeat is raised by 18 and 24 beats after jump rope and running, respectively. The
conclusion is that the heartbeat rate is raised the most after performing the jumping
jack exercise, which proves the correctness of the proposed technique.
Figure 13.5 shows the graphical representation of heartbeat rate according to the
types of exercise given. The authors also provide an experimental table that com-
pares the heartbeat rate of a limited number of patients using the developed system
and manually. This result shows the correctness of the proposed approach as well as
the percentage rate of error of the proposed system. Table 13.4 tabulates the obtained
heartbeat in BPM to compare the percentage rate of error of the proposed system.
Table 13.5 shows the expected results of the proposed system for the systolic and
diastolic rates of blood flow rate.
Based on this patient’s results data, according to the proposed system, the display
monitor shows a warning message because the results data value does not meet the
reference range given to the system, and doctors can take immediate action in this
critical situation. Figure 13.6 plots a graph representation of systolic and diastolic
blood flow rate readings and also provides a pictorial representation of how the first
and last audio values are generated using the cuff sensor.
The authors also conducted an experiment on a critically ill child in the age
range of 0–15 years to monitor a data report of systolic and diastolic reading abnor-
malities along with the heartbeat rate to examine the reliability of our developed
196 Computational Intelligence in Biomedical and Health Informatics
TABLE 13.4
Comparison of Heartbeat Reading through Developed System and Reading
Manually
Heartbeat by Heartbeat by
Subject Gender Age Developed System Manually Error (%)
TABLE 13.5
Sample Systolic and Diastolic Rate Readings
Name of patient: Sample 1
Age: 65
Gender: Female
Systolic rate: 140 Display warningmessage
and
diastolic rate: 89
FIGURE 13.6 Systolic and diastolic blood flow rate reading for a sample value.
Intelligent Development in Healthcare With the Internet 197
approach. Table 13.6 shows some random experimental results for systolic and dia-
stolic parameters.
Before starting the interpretation of an ECG, the calibration of the ECG, the heart
rate of that patient, the patient’s heart rhythm, the cardiac wave through an acoustic
sensor, etc. are examined. Figure 13.7 shows the expected results of the proposed
system for ECG graph reading.
TABLE 13.6
Experimental Table of Stabilization of Critically Ill Child
Systolic Blood Diastolic Blood Heartbeat Rate
Age Flow Rate Flow Rate in BPM
In ECG, three features are included in the form of waves: one is the P wave, which
is related to the activation of artia; another is the compound form of QRS, which is
responsible for the activation of ventricles; and, lastly, the T wave is used to repolar-
ize the ventricles.
The different electrocardiogram intervals produced are based on the starting and
ending times of the waveform. As shown in Figure 13.8, P-R is the time interval from
the start of the P wave to the start of QRS. The QRS interval refers to the duration
between the starting and ending times of the QRS complex. The Q-T interval is the
time period between the start of the QRS and the end of the T wave.
13.5 IMPLEMENTATION
The implementation process of this proposed system consists of six different mod-
ules, termed as an Acoustic body sensor and coordinator device/node, Access Point
(AP), servers, XAMPP platform, Open/Limited access blockchain and decentralized
network of blockchain, display monitoring center and emergency services.
communicate with the wireless sensor network. It can translate other signals to its
corresponding audio signal, has the ability to gather organized data from the audio
signal, and has the potential to detect human activity with different connected nodes
within the network. These nodes are connected to the coordinator device through
hardwire or wirelessly.
13.5.2 Access Point
A device that is used to connect wireless devices to a wired network through the
Internet, Wi-Fi, or Bluetooth is called an access point (AP). A router is connected to
the AP through the wired network in the form of a separate device, or the device may
be connected directly as an inherent part of a router. Atypically, an AP connects to a
wired local area network, after which the AP allows wireless connections to different
devices using that connection. The healthcare associate looking to enter registers
with the gateway, records the neighbor’s details, and connects with the neighbor.
Following that, the AP, according to the registration requests, generates from sensing
elements, and identifies the devices in its coverage area. If a node is gifted inside the
coverage region, it is identified with the access point as well. If the sensor is outside
the existing coverage area of network, the node of the sensor device registers to the
new access, collect data, and transfers it to the access point.
13.5.3 Servers
Different servers can be used here, such as application servers, real-time com-
munication servers, database servers, etc. An application server is used to host
applications. Application servers are placed between database servers and Apache
web servers, physically or virtually, to interact between stored application data
and communicating clients. These application servers are heavily configured com-
puters that provide various application resources to system users and web clients.
The real-time communication server is used so that all data readings taken from
the patient’s body are instant values or have negligible latency or transmission
delay. Hence real-time communications are never stored in an interim state any-
where between the source and the destination; for this reason, the proposed system
has been recognized as a live monitoring system. Some database servers are also
implemented to operate collected data in a managed and organized way. Database
servers are highly configured computers that are used to manage and store data in
a well-formed manner; the data is stored on a server for a network of patients and
various deployed devices.
13.5.4 XAMPP Platform
XAMPP is an open source and free network. It works on all possible available oper-
ating systems such as windows, MAC, and Linux system. Generally, two local hosts
are available: One is WAMPP, and the other is XAMPP. But WAMPP is only suitable
for the Windows operating system; so, in this technique, XAMPP platform is used.
Also it is the best platform among all web application in PHP.
200 Computational Intelligence in Biomedical and Health Informatics
13.5.8 Emergency Services
If any patient’s test report produces abnormal results or it does not meet the respec-
tive reference values, then, from this central monitoring center, a doctor/medical
staff can take necessary emergency action for this patient.
REFERENCES
Abdulameer, T. H., Ibrahim, A. A., & Mohammed, A. H. (2020). Design of health care moni-
toring system based on internet of thing (IOT). In 4th International Symposium on Multi‑
disciplinary Studies and Innovative Technologies (ISMSIT) (pp. 1–6). IEEE.
Alenoghena, C. O, Onumanyi, A. J., Ohize, H. O., Adejo, A. O., Oligbi, M., Ali, S. I., & Okoh,
S. A. (2022). eHealth: A survey of architectures, developments in mHealth, security
concerns and solutions. International Journal of Environmental Research and Public
Health, 19(20), 13071.
Ali Alheeti, K. M., & Al-Ani, M. S. (2018). Video compression via minimum frame differ-
ence localization adapted for mobile communications. Journal of Theoretical & Applied
Information Technology, 96(15).
Almutari, M., Gabralla, L. A., Abubakar, S., & Chiroma, H. (2022). Detecting Elderly Behav‑
iors Based on Deep Learning for Healthcare: Recent Advances, Methods, Real-World
Applications and Challenges. IEEE.
Angraal, S., Krumholz, H. M., & Schulz, W. L. (2017). Blockchain technology: Applications
in health care. Circulation: Cardiovascular Quality and Outcomes, 10(9), e003800.
Berdik, D., Otoum, S., Schmidt, N., Porter, D., & Jararweh, Y. (2021). A survey on blockchain
for information systems management and security. Information Processing & Manage‑
ment, 58(1), 102397.
Bhambri, P., & Gupta, O. P. (2013a). Genetic diversity in bioinformatics: A novel application
of biology. Journal of Advances in Biology, 1(1), 16–20.
202 Computational Intelligence in Biomedical and Health Informatics
Bhambri, P., & Gupta, O. P. (2013b). Efficient deployment of heterogeneous sensors for track-
ing moving objects: An algorithmic approach. International Journal of Latest Research
in Engineering and Computing, 1(1), 78–83.
Bhambri, P., & Gupta, O. P. (2013c). Analyzing induction attributes of decision tree. Interna‑
tional Journal of Computer Technology and Research, 1(7), 166–169.
Bhambri, P., & Gupta, O. P. (2013d). Implementing pattern based clustering. International
Journal of Research, 1(5).
Brodeur, A., Gray, D., Islam, A., & Bhuiyan, S. (2021). A literature review of the economics of
COVID‐19. Journal of Economic Surveys, 5(4), 1007–1044.
Campbell-Verduyn, M. (2017). Bitcoin and Beyond: Cryptocurrencies, Blockchains and
Global Governance. Taylor & Francis.
Casino, F., Dasaklis, T. K., & Patsakis, C. (2019). A systematic literature review of block-
chain-based applications: Current status, classification and open issues. Telematics and
Informatics, 36, 55–81.
Chattu, V. K., Nanda, A., Chattu, S. K., Kadri, S. M., & Knight, A. W. (2019). The emerging
role of blockchain technology applications in routine disease surveillance systems to
strengthen global health security. Big Data Cognitive Computing, 3, 25.
Dias, D. M., Kumar, S. B., & Mohindra, A. (2020). International business machines corp,
assignee. Patient treatment recommendations based on medical records and exogenous
information. United States patent US 10,790,048.20.
Ghosh, U., & Mondal, U. K. (2023). Improved wireless acoustic sensor network for analysing
audio properties. International Journal of Information Technology, 15, 1–9.
Griggs, K. N., Ossipova, O., Kohlios, C. P., Baccarini, A. N., Howson, E. A., & Hayajneh,
T. (2018). Healthcare blockchain system using smart contracts for secure automated
remote patient monitoring. Journal of Medical Systems, 42, 1–7.
Hewa, T., Ylianttila, M., & Liyanage, M. (2021). Survey on blockchain based smart contracts:
Applications, opportunities and challenges. Journal of Network and Computer Applica‑
tions, 177, 102857.
Kataria, A., Puri, V., Pareek, P. K., & Rani, S. (2023, July). Human activity classification
using G-XGB. In 2023 International Conference on Data Science and Network Security
(ICDSNS) (pp. 1–5). IEEE.
Katuwal, G. J., Pandey, S., Hennessey, M., & Lamichhane, B. (2018). Applications of block-
chain in healthcare: Current landscape & challenges. ArXiv. abs/1812.02776. https://api.
semanticscholar.org/CorpusID: 54457701
Kaur, D., Singh, B., & Rani, S. (2023). Cyber security in the metaverse. In Handbook of Research
on AI-Based Technologies and Applications in the Era of the Metaverse (pp. 418–435).
IGI Global.
Kobo, H. I., Abu-Mahfouz, A. M., & Hancke, G. P. (2017). A survey on software-defined
wireless sensor networks: Challenges and design requirements. IEEE Access, 8(5),
1872–1899.
Mahmood, S. N., Ishak, A. J., Saeidi, T., Soh, A. C., Jalal, A., Imran, M. A., & Abbasi, Q. H.
(2021). Full ground ultra-wideband wearable textile antenna for breast cancer and wire-
less body area network applications. Micromachines, 12(3), 322.
Morishima, S., Xu, Y., Urashima, A., & Toriyama, T. (2021). Human body skin temperature
prediction based on machine learning. Artificial Life and Robotics, 26, 103–108.
Online Electronics, Electrical Engineering Knowledge. www.ecstuff4u.com/2018/07/
symme-trical-and-anti-symmetrical-signal.html?m=1 [Last accessed: 15th July, 2023].
Puri, V., Kataria, A., Rani, S., & Pareek, P. K. (2023, September). DLT based smart medical
ecosystem. In 2023 International Conference on Network, Multimedia and Information
Technology (NMITCON) (pp. 1–6). IEEE.
Rani, S., Kumar, S., Kataria, A., & Min, H. (2023). SmartHealth: An intelligent framework to
secure IoMT service applications using machine learning. ICT Express, 48, 1–6.
Intelligent Development in Healthcare With the Internet 203
Rani, S., Mishra, A. K., Kataria, A., Mallik, S., & Qin, H. (2023). Machine learning-based
optimal crop selection system in smart agriculture. Scientific Reports, 13(1), 15997.
Rehan, W., Fischer, S., & Rehan, M. (2018). Anatomizing the robustness of multichannel
MAC protocols for WSNs: An evaluation under MAC oriented design issues impacting
QoS. Journal of Network and Computer Applications, 121, 89–118.
Roman-Belmonte, J. M., De la Corte-Rodriguez, H., & Rodriguez-Merchan, E. C. (2018).
How blockchain technology can change medicine. Postgraduate Medical, 130, 420–427.
Sharma, A., & Kumar, R. (2019). Service-level agreement—energy cooperative quickest
ambulance routing for critical healthcare services. Arabian Journal for Science and
Engineering, 44(4), 3831–3848.
Sharma, A., Rathee, G., Kumar, R., Saini, H., Varadarajan, V., Nam, Y., & Chilamkurti, N.
(2019). A secure, energy-and sla-efficient (sese) e-healthcare framework for quickest
data transmission using cyber-physical system. Sensors, 19(9), 2119.
Sharma, M., & Bhambri, P. (2013). A study of GENE prediction program of metagenomic
data on various GENE prediction software. International Journal of Advanced Research,
1(7), 394–399.
Sobral, J. V., Rodrigues, J. J., Rabêlo, R. A., Al-Muhtadi, J., & Korotaev, V. (2019). Routing
protocols for low power and lossy networks in internet of things applications. Sensors,
19(9), 2144.
Tseng, J. H., Liao, Y. C., Chong, B., & Liao, S. W. (2018). Governance on the drug supply
chain via Gcoin blockchain. International Journal of Environmental Research and Pub‑
lic Health, 15, 1055.
Upadhyay, N. (2020). Demystifying blockchain: A critical analysis of challenges, applications
and opportunities. International Journal of Information Management, 54, 102120.
Vallabh, P., & Malekian, R. (2018). Fall detection monitoring systems: A comprehensive
review. Journal of Ambient Intelligence and Humanized Computing, 9, 1809–1833.
Vazirani, A. A., O’Donoghue, O., Brindley, D., & Meinert, E. (2019). Implementing block-
chains for efficient health care: Systematic review. Journal of Medical Internet Research,
21, e12439.
14 Intelligent Development
in Healthcare With
the Internet
Case Study II
Varsha Gautam and Surbhi Gupta
14.1 INTRODUCTION
Enhancing the quality and accessibility of healthcare while maintaining afford-
ability is a global challenge faced by healthcare organizations (Raja et al., 2023).
This challenge is exacerbated by the rapid growth of the world’s aging population,
particularly in the 60 and older age group, which is predicted to reach 2.1 billion
by 2050 according to the World Health Organization (WHO). An aging population
often leads to an increase in chronic diseases, requiring frequent medical visits and
hospital stays. As the number of patients in need of ongoing care rises, the cost of
healthcare also escalates.
Currently, monitoring a patient’s health for specific risks presents difficulties for
doctors, including constant patient tracking and timely administration of medication
(Tian et al., 2019). Researchers are actively pursuing the development of an ideal
system by leveraging current cutting-edge concepts and methods. Recent years have
witnessed successful deployments of various iterations of healthcare monitoring sys-
tems in multispecialty hospitals, healthcare facilities, and laboratories, with continu-
ous improvements in technology and implementation (Tian et al., 2019; Bhambri and
Gupta, 2013; Raja et al., 2023). The entire healthcare industry, like many others, is
undergoing a digital transformation, and technologies such as 5G, cloud computing,
and AI are poised to bridge various gaps. These gaps range from limited access
to basic healthcare services in some regions to a projected workforce shortage of
18 million by 2030 (Charalambous et al., 2023; Morrow et al., 2023). The Internet
of Medical Things (IoMT) has gained widespread use in the healthcare sector, facil-
itating patient access to care and optimizing delivery methods. IoMT usage has led
to the development of electronic health record (EHR) systems, allowing the seam-
less exchange of patient health history among physicians. EHRs improve patient–
provider communication and are integral to the concept of digital healthcare, also
known as connected health. Connected health has evolved over time, offering more
flexibility and convenience in healthcare management beyond electronic patient
data and web portals. Mobile applications, smart devices, and wireless technologies
enable patients to easily connect with their clinicians without frequent visits. The
evolution of connected health into smart health enables continuous monitoring and
treatment for patients, even in their homes, through wearable medical devices, IoT
sensors, and implantable or ingestible sensors. Smart health is expected to reduce
hospitalization costs and provide prompt treatment for various medical conditions
(Cheng et al., 2021; Kelly et al., 2020). The combination of IoT sensors and smart
health devices generates significant amounts of data, often referred to as big data.
Effective analytic tools can process this data to deliver valuable insights to doctors,
enabling prompt and informed decision-making for improved health management.
In conclusion, the integration of advanced technologies like IoT and smart health
has the potential to revolutionize healthcare, offering continuous monitoring, per-
sonalized care, and data-driven insights to healthcare providers and patients alike.
This transformative approach to healthcare management is a promising solution to
address the challenges posed by an aging population and the increasing demand for
quality healthcare services worldwide.
equipment, patients can now be evaluated and monitored in their homes, creating a
seamless continuum of care accessible through cloud platforms. Virtual models are
being used to extend treatment from hospitals to home settings (Verdejo et al., 2021;
Othman et al., 2019).
At the heart of these smart health services lies IoT, providing the essential plat-
form for their functioning. IoT facilitates the collection, transmission, and storage of
health data through sensors, enabling data analytics and intelligent healthcare prac-
tices. This empowers healthcare providers to better identify risk factors, diagnose
and treat diseases, monitor patients remotely, and empower patients to self-manage
their health. Furthermore, IoT opens up opportunities to enhance the overall service
delivery ecosystem’s effectiveness and efficiency. This includes optimizing hospital
management, medical asset management, staff workflow monitoring, and resource
allocation based on patient flow (Kelly et al., 2020). The dependency of healthcare
on IoT is evident, as shown in Figure 14.2.
“smart grid,” “smart city,” and “smart health.” Public health, sustainable develop-
ment, and energy efficiency are interconnected factors that have the power to change
an environment or a system for the betterment of both people and the environment
(Ahmed et al., 2020). Almost all corporate sectors have benefited greatly from IoT
technologies, which has also revolutionized how various procedures are carried out
and managed. It involves tying sensors and actuators to mechanical and digital equip-
ment, furniture, items, animals, and people in order to collect data and boost effi-
ciency, productivity, and well-being (Mohapatra et al., 2019). For instance, machine
learning has an impact on Industry 4.0, digital enterprise transformation, hospitality
and tourism, education and e-learning platforms, hospitals, and healthcare systems
(Rani, Kumar et al., 2023). IoMT is one of the most promising technical solutions to
bridge the global health equality gap. It has merged as the base of intelligent health-
care (Bhambri, 2014c).
Figure 14.3 shows the cyclic chain of improvement and development of intelligent
development, healthcare information, awareness, knowledge, communication, diag-
nosis, treatment, better healthcare systems, and sustainable development, represent-
ing IoT/IoMT as the key to sustainable development of any nation.
The COVID-19 coronavirus illness has affected healthcare services. The collection
of information on disease symptoms, statistics, and contact tracking was greatly aided
by digital technology (Chang, 2020; Othman et al., 2019). Machine learning improves
and increases the efficacy of traditional healthcare systems (Sidey-Gibbons et al., 2019).
This chapter examines machine learning methods and resources that can improve
the effectiveness of intelligent healthcare (Rani, Mishra et al., 2023). The information
presented illustrates the extraordinarily potent learning algorithms that are revolu-
tionizing the healthcare industry. The ensuing sections talk about machine learning.
When big data, machine learning, and the IoT are combined, intelligent healthcare
benefits greatly (Jahan T., 2021).
14.5 METHODOLOGY
The proposed methodology of this chapter revolves around the utilization of the
Kaggle Community Platform to classify MRI images into distinct brain tumor types
or identify the absence of a tumor (Puri et al., 2023, September)). This classifica-
tion task is achieved through the implementation of a convolutional neural network
(CNN) using Keras and OpenCV. The methodology comprises the following steps:
CNN Training:
The convolutional neural network (CNN) algorithm is used for deep learning.
The model is trained on the training set to learn the patterns and features
associated with different brain tumor types.
Performance Evaluation:
Accuracy graphs and loss graphs are generated to visualize the model’s per-
formance during the training process.
These graphs provide insights into the accuracy and loss metrics as the
model iteratively learns from the training data.
Prediction:
Images are imported from TensorFlow for processing and analysis.
The model takes an image URL as input to make predictions about the pres-
ence of a brain tumor in the MRI image.
The model utilizes the “predict” function to carry out the prediction process and
determine whether a brain tumor is present or not in the given MRI image.
Hardware Acceleration: The method utilizes the notebook accelerator GPU
P100 for faster execution.
By following this methodology, the goal of the work is to achieve accurate classi-
fication of MRI images into different brain tumor types or determine the absence of
a tumor. The steps are shown as in Figure 14.4.
14.6 RESULT
The training and authentication accuracy rate is good as the graph is increasing, as
shown in Figure 14.5(a), and our training and validation loss rate is also satisfactory,
as we can see in the chart. It’s quite less, as shown in Figure 14.5(b).
After importing the image from the file, we applied our methodology to analyze
and classify the image. The output of this process is presented in Figure 14.6.
Figure 14.6 shows an image that represents a pituitary tumor. In our classification
scheme, this type of tumor is assigned the label 3. Additionally, we classified other
types of tumors as follows:
FIGURE 14.5 (a) Training and validation accuracy rate. (b) Training and validation loss rate.
14.7 DISCUSSION
Machine learning in healthcare holds the potential to revolutionize personalized and
population medicine, representing a profound leap forward in the medical field’s
capabilities and applications.
14.8 CONCLUSION
In conclusion, the investigation conducted highlights the significance of ML as a
prominent research field and a technology that aims to replicate human intelligence.
One of the key applications of ML in healthcare is its ability to examine huge quan-
tities of data to categorize potential clinical trial candidates by utilizing predictive
models based on previous medical history, doctor visits, and other relevant data
points. This enables scientists to streamline the selection process and make informed
decisions.
ML has proven to be beneficial for hospitals and healthcare systems by assisting
in various tasks. Deep learning algorithms, which rely on well-prepared healthcare
data, enable computers to quickly identify patterns and make assumptions. This
capability is instrumental in enhancing the accuracy of diagnoses, treatment plans,
and patient outcomes.
Moreover, ML plays a crucial role in healthcare administrations by facilitating
risk assessment and mitigation. By utilizing ML algorithms, healthcare provid-
ers can identify hidden risk factors and address gaps in care, thereby improving
the accuracy of risk scoring. This empowers healthcare professionals to make
informed decisions and take necessary actions to prevent adverse events and
enhance patient safety.
Another advantage of integrating ML in healthcare is its potential for error reduc-
tion. By automating certain processes and leveraging algorithms to analyze data,
214 Computational Intelligence in Biomedical and Health Informatics
REFERENCES
Abdelaziz, A., Elhoseny, M., Salama, A., & Riad, A. (2018). A machine learning model for
improving healthcare services on cloud computing environment. Measurement, 119.
https://doi.org/10.1016/j.measurement.2018.01.022.
Ahmed, Z., Mohamed, K., Zeeshan, S., & Dong, X. (2020). Artificial intelligence with
multi-functional machine learning platform development for better healthcare and pre-
cision medicine. Database: The Journal of Biological Databases and Curation, 2020,
baaa010. https://doi.org/10.1093/database/baaa010.
Bhambri, P. (2014a). Consumer rights awareness. In Management of Globalized Business
Plethora of New Opportunities (pp. 93–110). Bharti Publications.
Bhambri, P. (2014b). Estimation with non-response in cluster sampling design. In Manage‑
ment of Globalized Business Plethora of New Opportunities (pp. 111–113). Bharti
Publications.
Bhambri, P. (2014c). Effectiveness of performance management system in IT industries:
Empirical approach. In Management of Globalized Business Plethora of New Opportu‑
nities (pp. 114–121). Bharti Publications.
Bhambri, P., & Gupta, O. P. (2013). A survey of HPC applications appropriate for execution
on DSM and grid system. International Journal of Research in Management, Science &
Technology, 1(2), 79–83.
Bhambri, P., & Gupta, O. P. (2014). Perspective on simulation of conceptual knowledge. BIO‑
INFO Computer Engineering, 3(1), 57–59.
Chang, A. (2020). Intelligence-based medicine: Medici Effect of the modern medical era.
Intelligence-Based Medicine, 1–2, 100003. https://doi.org/10.1016/j.ibmed.2020.100003.
Charalambous, A., & Dodlek, N. (2023). Big data, machine learning, and artificial intelligence
to advance cancer care: Opportunities and challenges. Seminars in Oncology Nursing,
39(3), 151429. https://doi.org/10.1016/j.soncn.2023.151429.
Cheng, Y., Zhao, X., Wu, J., Liu, H., Zhao, Y., Al Shurafa, M., & Lee, I. (2021). Research on
the smart medical system based on NB-IoT technology. Mobile Information Systems,
2021, 7801365. https://doi.org/10.1155/2021/7801365.
Jahan, T. (2021). Machine learning with IoT and big data in healthcare. In S. Bhatia, A. K.
Dubey, R. Chhikara, P. Chaudhary, & A. Kumar (Eds.), Intelligent Healthcare: Appli‑
cations of AI in eHealth (pp. 81–98). Springer International Publishing. https://doi.
org/10.1007/978-3-030-67051-1_5.
Intelligent Development in Healthcare With the Internet 215
Javaid, M., Haleem, A., Singh, R., Suman, R., & Rab, S. (2022). Significance of machine
learning in healthcare: Features, pillars and applications. International Journal of Intel‑
ligent Networks, 3. https://doi.org/10.1016/j.ijin.2022.05.002.
Kataria, A., Puri, V., Pareek, P. K., & Rani, S. (2023, July). Human activity classification
using G-XGB. In 2023 International Conference on Data Science and Network Security
(ICDSNS) (pp. 1–5). IEEE.
Kaur, D., Singh, B., & Rani, S. (2023). Cyber security in the metaverse. In Handbook of Research
on AI-Based Technologies and Applications in the Era of the Metaverse (pp. 418–435).
IGI Global.
Kelly, J. T., Campbell, K. L., Gong, E., & Scuffham, P. (2020). The internet of things: Impact
and implications for health care delivery. Journal of Medical Internet Research, 22(11),
e20135. https://doi.org/10.2196/20135.
Mohapatra, S., Mohanty, S., & Mohanty, S. (2019). Smart Healthcare: An Approach for
Ubiquitous Healthcare Management Using IoT (pp. 175–196). https://doi.org/10.1016/
B978-0-12-818146-1.00007-6.
Morrow, E., Zidaru, T., Ross, F., Mason, C., Patel, K. D., Ream, M., & Stockley, R. (2023).
Artificial intelligence technologies and compassion in healthcare: A systematic scoping
review. Frontiers in Psychology, 13, 971044. https://doi.org/10.3389/fpsyg.2022.971044.
Othman, S. B., Almalki, F. A., & Sakli, H. (2022). Internet of things in the healthcare appli�-
cations: Overview of security and privacy issues. In C. Chakraborty & M. R. Khosravi
(Eds.), Intelligent Healthcare: Infrastructure, Algorithms and Management (pp. 195–
213). Springer Nature. https://doi.org/10.1007/978-981-16-8150-9_9.
Othman, S. B., Bahattab, A., Trad, A., & Youssef, H. (2019a). RESDA: Robust and Efficient
Secure Data Aggregation Scheme in Healthcare using the IoT. https://doi.org/10.1109/
IINTEC48298.2019.9112125.
Ozaydin, B., Berner, E., & Cimino, J. (2021). Appropriate use of machine learning in healthcare.
Intelligence-Based Medicine, 5, 100041. https://doi.org/10.1016/j.ibmed.2021.100041.
Puri, V., Kataria, A., Rani, S., & Pareek, P. K. (2023, September). DLT based smart medical
ecosystem. In 2023 International Conference on Network, Multimedia and Information
Technology (NMITCON) (pp. 1–6). IEEE.
Raja, G. B., & Chakraborty, C. (2023). Chapter 9—Internet of things based effective wear-
able healthcare monitoring system for remote areas. In C. Chakraborty, S. K. Pani,
M. Abdul Ahad, & Q. Xin (Eds.), Implementation of Smart Healthcare Systems using
AI, IoT, and Blockchain (pp. 193–218). Academic Press. https://doi.org/10.1016/
B978-0-323-91916-6.00004-7.
Rani, S., Kataria, A., Kumar, S., & Tiwari, P. (2023). Federated learning for secure IoMT-
applications in smart healthcare systems: A comprehensive review. Knowledge-Based
Systems, 110658.
Rani, S., Kumar, S., Kataria, A., & Min, H. (2023). SmartHealth: An intelligent framework to
secure IoMT service applications using machine learning. ICT Express, 48, 1–6.
Rani, S., Mishra, A. K., Kataria, A., Mallik, S., & Qin, H. (2023). Machine learning-based
optimal crop selection system in smart agriculture. Scientific Reports, 13(1), 15997.
Shah, P., Kendall, F., Khozin, S., Goosen, R., Hu, J., Laramie, J., Ringel, M., & Schork, N.
(2019). Artificial intelligence and machine learning in clinical development: A transla-
tional perspective. NPJ Digital Medicine, 2. https://doi.org/10.1038/s41746-019-0148-3.
Shehab, M., Abualigah, L., Shambour, Q., Abu-Hashem, M. A., Shambour, M. K. Y., Alsalibi,
A. I., & Gandomi, A. H. (2022). Machine learning in medical applications: A review of
state-of-the-art methods. Computers in Biology and Medicine, 145, 105458.
Sidey-Gibbons, J. A. M., & Sidey-Gibbons, C. J. (2019). Machine learning in medicine:
A practical introduction. BMC Medical Research Methodology, 19(1), 64. https://doi.
org/10.1186/s12874-019-0681-4.
216 Computational Intelligence in Biomedical and Health Informatics
Tian, S., Yang, W., Le Grange, J. M., Wang, P., Huang, W., & Ye, Z. (2019). Smart health-
care: making medical care more intelligent. Global Health Journal, 3. https://doi.
org/10.1016/j.glohj.2019.07.001.
Valverde Landívar, G., Arambulo, J., Quiroz-Martinez, M., & Leyva-Vázquez, M. (2022).
Machine Learning Algorithm Selection for a Clinical Decision Support System Based on a
Multicriteria Method (pp. 1002–1010). https://doi.org/10.1007/978-3-030-85540-6_128.
Verdejo Espinosa, Á., Lopez Ruiz, J., Mata Mata, F., & Estevez, M. E. (2021). Application of
IoT in healthcare: Keys to implementation of the sustainable development goals. Sensors
(Basel, Switzerland), 21(7), 2330. https://doi.org/10.3390/s21072330.
Verma, V. K., & Verma, S. (2022). Machine learning applications in healthcare sector: An
overview. Materials Today: Proceedings, 57, 2144–2147. https://doi.org/10.1016/j.
matpr.2021.12.101.
Vyas, D. S., Gupta, M., & Yadav, R. (2019). Converging Blockchain and Machine Learning for
Healthcare. https://doi.org/10.1109/AICAI.2019.8701230.
15 Unleashing the
Potential of Blockchain
in Healthcare
A Comparative Analysis
of Leading Companies
Navroop Kaur, Upinder Kaur, and Harpal Singh
15.1 INTRODUCTION
The healthcare industry is undergoing a digital transformation, driven by emerging
technologies that have the potential to revolutionize patient care, data management,
and overall healthcare delivery. One such technology that has garnered significant
attention is blockchain (Nofer et al., 2017). Blockchain, originally developed as the
underlying technology for cryptocurrencies like Bitcoin, is a distributed ledger sys-
tem that enables secure and transparent transactions. Its decentralized nature, cou-
pled with cryptographic algorithms, ensures the integrity, immutability, and privacy
of data stored within the blockchain (Kaur et al., 2014).
Blockchain technology offers a unique approach to data management and secu-
rity, making it well-suited for various industries, including healthcare. At its core,
blockchain consists of a chain of blocks, where each block contains a set of transac-
tions. These blocks are cryptographically linked together, forming an immutable and
tamper-proof ledger (Androulaki et al., 2018). Unlike traditional centralized systems,
blockchain does not rely on a single authority to validate and record transactions.
Instead, it employs a consensus mechanism, such as proof-of-work or proof-of-stake,
to achieve agreement among participants on the state of the ledger (Rani, Mishra,
et al., 2023).
In the healthcare sector, blockchain holds the promise of transforming the way
medical records are managed, enhancing data security, streamlining processes,
and improving patient outcomes (Wenhua et al., 2023). By leveraging blockchain,
healthcare organizations can create a transparent and trustworthy system for storing,
accessing, and sharing sensitive patient data.
often suffer from data silos, fragmented medical records, and interoperability issues,
which hinder seamless data sharing and collaboration among healthcare providers
(Kaur & Bhambri, 2015a). Furthermore, concerns around data security and privacy
breaches have been persistent. Blockchain technology offers a decentralized and
secure platform that can help overcome these challenges (Rani, Kumar, et al., 2023).
By decentralizing data storage and implementing robust encryption algorithms,
blockchain can enhance the security and privacy of patient data (Ghosh et al., 2023).
The distributed nature of the blockchain ensures that data is not controlled by a single
entity, reducing the risk of unauthorized access or manipulation. Additionally, the
transparency and immutability of blockchain records enable auditable and traceable
transactions, increasing trust among stakeholders and reducing fraudulent activities
(Kaur et al., 2023).
Moreover, blockchain has the potential to revolutionize healthcare data interoper-
ability, allowing different systems and stakeholders to seamlessly exchange informa-
tion (Villarreal et al., 2023). Smart contracts, a feature of blockchain, can automate
and enforce agreements, streamlining processes such as insurance claims, supply
chain management, and clinical trials. By eliminating intermediaries and reduc-
ing administrative overhead, blockchain technology can improve efficiency, reduce
costs, and ultimately enhance patient care.
Hence the introduction of blockchain technology in healthcare represents a trans-
formative shift, and, by addressing data management challenges, enhancing security
and privacy, and enabling seamless interoperability, blockchain has the potential to
revolutionize healthcare delivery and empower both healthcare providers and patients.
(Androulaki et al., 2018) empower patients to have greater control over their health
data, determining who can access and utilize their information.
15.4.1 Scalability
Blockchain technology, particularly public blockchains like Bitcoin and Ethereum,
currently face scalability limitations in terms of transaction throughput and network
capacity (Bhambri, 2016). As healthcare generates vast amounts of data, scalability
becomes a crucial consideration to ensure the efficient processing and storage of data
on the blockchain.
15.5.1 Public Blockchains
Public blockchains, such as Bitcoin and Ethereum, are open and decentralized net-
works that anyone can join. They offer transparency and immutability, as all trans-
actions are recorded on a public ledger that can be accessed and verified by anyone.
Public blockchains are well-suited for use cases that require a high level of trans-
parency and where trust is established through consensus among participants. In
healthcare, public blockchains can be used for applications like patient consent man-
agement, clinical research data sharing, and global health data interoperability.
15.5.2 Private Blockchains
Private blockchains, on the other hand, are permissioned networks where access and
participation are restricted to a specific group of participants. These blockchains
offer higher privacy and control compared to public blockchains. Private blockchains
are particularly useful in healthcare settings where sensitive patient data needs to be
shared securely among authorized entities. For example, a private blockchain could
be employed by a group of hospitals to securely exchange patient records, streamline
insurance claims, or manage the supply chain of pharmaceutical products.
15.5.3 Federated Blockchains
Federated blockchains combine elements of both public and private blockchains.
They involve a consortium of organizations or entities that jointly participate in
maintaining the blockchain network. Federated blockchains offer a balance between
transparency and privacy. They enable multiple organizations to collaborate and
share data while maintaining control over access and governance. In healthcare,
federated blockchains can be utilized for regional health information exchange
Unleashing the Potential of Blockchain in Healthcare 221
networks, where different healthcare providers share patient data within a defined
geographic area.
TABLE 15.1
Comparative Analysis of Leading Companies in Blockchain Healthcare
Blockchain Token Smart
Company Type Usage Contract Application
drive adoption, enhance platform utility, and promote a thriving blockchain health-
care ecosystem.
Third, smart contracts automate and enforce predefined rules and agreements,
enabling self-executing transactions without the need for intermediaries. The impor-
tance of smart contract applications in blockchain healthcare solutions lies in stream-
lining administrative processes, enhancing data integrity, and reducing operational
costs. Smart contracts can facilitate secure and efficient data sharing, streamline
insurance claim processing, and automate consent management. By utilizing smart
contracts, healthcare organizations can improve the overall efficiency of their opera-
tions and enhance patient experiences.
Last, each company’s specific use cases and applications determine the alignment
of blockchain technology with their healthcare objectives. For example, blockchain’s
application in electronic health record (EHR) management prioritizes data security and
interoperability, while in pharmaceutical supply chains, blockchain ensures transpar-
ency and traceability. The importance of tailoring blockchain applications to healthcare
use cases lies in addressing industry-specific challenges and optimizing the impact of
blockchain technology in improving patient outcomes and operational efficiencies.
ProCredEx’s secure data transfer through private and federated blockchains facil-
itates seamless data exchange among healthcare stakeholders, promoting interopera-
bility and collaboration. However, the complexity of managing different blockchain
types may require careful governance.
Dentacoin’s public-blockchain-based platform incentivizes patient engagement
and dental health practices through cryptocurrency rewards. Nevertheless, concerns
about scalability and regulatory compliance in using cryptocurrency may arise.
Clinicoin’s private blockchain for fitness and wellness data tracking ensures data
privacy and encourages community engagement. However, limited accessibility to
data for nonmembers may impact data sharing and research collaboration.
Akira’s secure private network management through private and federated block-
chains ensures data security and privacy. However, the need for trusted subscribers
and limited data visibility beyond the network may restrict data sharing.
In conclusion, the key findings illustrate how each company’s blockchain
approach aligns with specific healthcare applications and presents unique advantages
and disadvantages. Understanding these factors is vital for stakeholders consider-
ing the adoption of blockchain solutions in healthcare. While blockchain technology
offers promising benefits in healthcare data management, supply chain transparency,
patient-centric care, and more, it also brings challenges related to privacy, scalability,
interoperability, and regulatory compliance. By carefully evaluating and addressing
these factors, healthcare organizations can harness the true potential of blockchain
to revolutionize healthcare and improve patient outcomes.
records, granting them access to comprehensive and accurate medical histories, fos-
tering better care coordination, and improving treatment outcomes.
Additionally, blockchain technology enables streamlined and secure supply chain
management. Tracking pharmaceuticals and medical devices can enhance transpar-
ency, ensuring the authenticity of products and reducing the risk of counterfeit drugs
in the market.
Blockchain’s potential for data sharing and collaboration opens doors for medical
research and clinical trials. Researchers can access diverse datasets while preserving
patient privacy through encrypted and permission-based data access, accelerating
medical discoveries.
REFERENCES
Abou Jaoude, J., & George Saade, R. (2019). Blockchain applications—usage in different
domains. IEEE Access, 7, 45360–45381.
Akira Health. (n.d.). Retrieved July 22, 2023, from https://akirahealth.com/
Androulaki, E., Barger, A., Bortnikov, V., Muralidharan, S., Cachin, C., Christidis, K., De
Caro, A., Enyeart, D., Murthy, C., Ferris, C., Laventman, G., Manevich, Y., Nguyen,
B., Sethi, M., Singh, G., Smith, K., Sorniotti, A., Stathakopoulou, C., Vukolić, M., . . .
Yellick, J. (2018, January). Hyperledger Fabric: A Distributed Operating System for
Permissioned Blockchains. Proceedings of the 13th EuroSys Conference, EuroSys 2018.
Bhambri, P. (2016). DNA to protein conversion. PCTE Journal of Computer Sciences, 14(2),
58–61.
Care Optimization—BurstIQ. (n.d.). Retrieved July 22, 2023, from https://burstiq.com/
care-optimization/
Clinicoin—Global Health and Wellness Blockchain Platform. (n.d.). Retrieved July 22, 2023,
from https://clinicoin.io/en
Dentacoin. (n.d.). Retrieved July 22, 2023, from https://dentacoin.com
DokChain by PokitDok—Blockchain for Healthcare—McKessonVentures. (n.d.). Retrieved July 22,
2023, from https://ventures.mckesson.com/dokchain-pokitdok-blockchain-healthcare/
Ekblaw, A., & Azaria, A. (2016). MedRec: Medical data management on the blockchain. Viral
Communications. https://viral.media.mit.edu/pub/medrec/release/1
Unleashing the Potential of Blockchain in Healthcare 227
Rani, S., Kumar, S., Kataria, A., & Min, H. (2023). SmartHealth: An intelligent framework to
secure IoMT service applications using machine learning. ICT Express, 48, 1–6.
Robomed Network and the New Era of Token-Based Healthcare—Bitcoin Magazine—Bitcoin
News, Articles and Expert Insights. (n.d.). Retrieved July 22, 2023, from https://bitcoin-
magazine.com/business/robomed-network-and-new-era-token-based-healthcare
SimplyVital Health Is Using Blockchain to Revolutionize Healthcare. (n.d.). Retrieved July 22, 2023,
from www.forbes.com/sites/jessedamiani/2017/11/06/simplyvital-health-blockchain-
revolutionize-healthcare/?sh=2c10df75880a
Villarreal, E. R. D., Garcia-Alonso, J., Moguel, E., & Alegria, J. A. H. (2023). Blockchain
for healthcare management systems: A survey on interoperability and security. IEEE
Access, 11, 5629–5652.
Wenhua, Z., Qamar, F., Abdali, T. A. N., Hassan, R., Jafri, S. T. A., & Nguyen, Q. N. (2023).
Blockchain technology: Security issues, healthcare applications, challenges and future
trends. Electronics, 12(3), 546.
16 Threat Analysis and
Security Measures for
the Internet of Medical
Things (IoMT): A Study
S. Velmurugan, G. Shanthi, L. Raja, and D. Subitha
16.1 INTRODUCTION
16.1.1 Internet of Medical Things (IoMT)
In recent years, the healthcare sector has made remarkable progress due to disrup-
tive technologies. India is a growing economy, and healthcare in particular is one of
the largest sectors in India in terms of both revenue and employment aspects. The
Internet of Medical Things is the most promising technology and has become a game
changer and telehealth leader in the healthcare sector as a patient-centric approach.
The Internet of Medical Things offers the connection of smart medical devices and
supported software applications to improve hospital services, medical equipment,
telehealth, telemedicine, medical visits, and various types of health insurance to
reduce healthcare costs and to improve the patient’s healthcare in an effective man-
ner. IoMT also has the ability to satisfy the fourth important sustainable development
goal of “Good health and well-being.”
According to a Deloitte report, the IoMT market will reach $158.1 billion in 2022,
and IoMT is called one of the key factors in the healthcare sector. The IoMT global
market is increasing the demand and is also expected to grow to $187.60 billion in
2028, at a compound annual growth rate (CAGR) of 29.5%, providing solutions in
the healthcare sector.
FIGURE 16.1 Architecture of data processing with various functionality layers in IoMT.
Smartwatch wearables are used to track heart rate, manage diabetes, assist with
speech therapy, help with posture correction, and even detect seizures. Due to brain
swelling, small sensors can be placed inside the skull to assist surgeons in contin-
uously monitoring brain damage and to prevent patients from experiencing life-
threatening swelling. Additionally, smart tablets support patients in their efforts to
preserve their own lives by remotely seeing the colon and gastrointestinal tract.
humidity between 20% and 90% and temperatures between 0°C and 50°C. The
IoMT device’s temperature increase is mostly caused by the antennas’ absorption of
radiation. Tang et al. (2005) noted that this increase in temperature of the implant-
able or wearable devices may cause harm to the user’s bodily tissues and organs
that are being monitored. The electrocardiogram sensor is used to analyze heart sig-
nals, irrespective of the body state of the person under examination (Onasanya and
Elshakankiri, 2021) when it deals with real-time ECG applications, because it is very
sensitive for data loss, and it is time critical (Kataria et al., 2023, July).
health insights. The resultant enhanced accuracy, accessibility, and efficiency pave
the way for better patient outcomes—a true quantum leap in the realm of medicine
CPS and IoMT have a wide range of applications in healthcare. A CPS, for exam-
ple, can be used to automate medical workflows, enhance resource allocation, and
increase patient safety. IoMT devices can be incorporated effortlessly into the CPS
infrastructure to remotely observe the health of the patient, track medication obser-
vance, and deliver real-time feedback to healthcare practitioners.
While CPS and IoMT are independent ideas, their integration can improve the
capabilities of healthcare systems by combining real-time data from IoMT devices
with the computing capacity and control mechanisms of CPS in healthcare applica-
tions; these relations are shown in Figure 16.2. This connection provides advanced
monitoring, decision-making, and automation in healthcare environments (Ali et al.,
2023), resulting in improved patient care and operational efficiency.
considerations for both the IoMT and CPS. Here are some examples of commonly
used mechanisms as shown in the Figure 16.3.
16.6.1 Estimation of Risk
IoT security ensures quick and accurate discovery, delivers built-in threat prevention,
and offers effortless deployment. Automatically assesses risk using data from vari-
ous sources while prioritizing risk scores in real time. With features like automated
tracking and reporting on medical equipment usage, maintenance windows, operat-
ing hours and device behavior comparisons, medical or clinical teams yield unprec-
edented business and operational insights to operate more efficiently everyday. IoT
security is delivered as a single platform that uniquely includes native enforcement
and playbook-driven built-in integrations into your existing workflows.
The deployment of IoMT systems into the healthcare domain is associated with a
number of risks:
16.7 CONCLUSION
Future healthcare will be built on the Internet of Medical Things to give greater
value, improve consumer happiness, and lower infrastructure costs. The IoMT can
enhance medical devices or services in the wearables sector of healthcare. It can
improve telemedicine, patient monitoring, drug administration, imaging, and gen-
eral hospital processes, among other healthcare applications. IoMT also develops
novel methods for treating various illnesses when patients live in outlying commu-
nities. Remote health monitoring technologies, smart gadgets, and the telemedicine
and telehealth sectors have all improved the world’s healthcare system. The security
essentials play a vital role in complete IoMT security in data processing, handling,
and development.
REFERENCES
Albrekht, Y., & Pysarenko, A. (2020). Multimodular Cyberphysical Systems: Challenges and
Existing Solutions. In 2020 IEEE 2nd International Conference on Advanced Trends
in Information Theory (ATIT), Kyiv, Ukraine, pp. 376–379. https://doi.org/10.1109/
ATIT50783.2020.9349291.
Ali, M., Naeem, F., Tariq, M., & Kaddoum, G. (2023). Federated Learning for Privacy
Preservation in Smart Healthcare Systems: A Comprehensive Survey. IEEE Jour‑
nal of Biomedical and Health Informatics, 27(2), 778–789. https://doi.org/10.1109/
JBHI.2022.3181823.
Appelboom, G., Camacho, E., Abraham, M. E. et al. (2014). Smart Wearable Body Sensors for
Patient Self-Assessment and Monitoring. Archives of Public Health, 72, 28. https://doi.
org/10.1186/2049-3258-72-28.
Bhambri, P., & Gupta, O. P. (2016). Phylogenetic Tree Construction with Optimum Multiple
Sequence Alignment. Biological Forum-An International Journal, 8(2), 330–339.
Bhambri, P., & Gupta, O. P. (2017a). Comparative Analysis of Ortholog and Paralog Detection.
International Journal of Research in Engineering, IT and Social Sciences, 7(5), 35–46.
Bhambri, P., & Gupta, O. P. (2017b). Phylogenetic Tree Construction for Distance Based
Methods. International Journal of Scientific Research in Computer Science and Engi‑
neering, 5(3), 142–149.
Bhambri, P., & Gupta, O. P. (2017c). Optimal Multiple Sequence Alignment. International
Journal of Scientific Research in Multidisciplinary Studies, 3(6), 54–60.
Bhatia, M., Kaur, S., Sood, S. K., & Behal, V. (2020). Internet of Things-Inspired Healthcare
System for Urine-Based Diabetes Prediction. Artificial Intelligence in Medicine, 107,
101913.
Cui, M., Baek, S. S., Crespo, R. G., & Premalatha, R. (2021). Internet of Things-Based Cloud
Computing Platform for Analyzing the Physical Health Condition. Technology and
Health Care. https://doi.org/10.3233/THC-213003.
Fernandez, E. B. (2016). Preventing and Unifying Threats in Cyberphysical Systems. In 2016
IEEE 17th International Symposium on High Assurance Systems Engineering (HASE),
Orlando, FL, USA, pp. 292–293. https://doi.org/10.1109/HASE.2016.50.
Jain, S., Nehra, M., Kumar, R., Dilbaghi, N., Hu, T., Kumar, S., Kaushik, A., & Li, C. Z. (2021,
May 1). Internet of Medical Things (IoMT)-Integrated Biosensors for Point-of-Care Testing
of Infectious Diseases. Biosensors and Bioelectronics, 179, 113074. https://doi.org/10.1016/
j.bios.2021.113074. Epub 2021 Feb 6. PMID: 33596516; PMCID: PMC7866895.
Kataria, A., Puri, V., Pareek, P. K., & Rani, S. (2023, July). Human Activity Classification
using G-XGB. In 2023 International Conference on Data Science and Network Security
(ICDSNS) (pp. 1–5). IEEE.
242 Computational Intelligence in Biomedical and Health Informatics
Kaur, H., & Bhambri, P. (2016). A Prediction Technique in Data Mining for the Diabetes Mel-
litus. Apeejay Journal of Management Sciences and Technology, 4(1), 1–12.
Khaitan, S. K., & McCalley, J. D. (2015). Design Techniques and Applications of Cyberphys-
ical Systems: A Survey. IEEE Systems Journal, 9(2), 350–365. https://doi.org/10.1109/
JSYST.2014.2322503.
Khan, I. A., Moustafa, N., Razzak, I., Tanveer, M., Pi, D., Pan, Y., & Ali, B. S. (2022). XSRU-
IoMT: Explainable Simple Recurrent Units for Threat Detection in Internet of Medi-
cal Things Networks. Future Generation Computer Systems, 127, 181–193. https://doi.
org/10.1016/j.future.2021.09.010.
Onasanya, A., & Elshakankiri, M. (2021). Smart Integrated IoT Healthcare System for Cancer
Care. Wireless Networks, 27(6), 4297–4312.
Panja, A. K., Mukherjee, A., & Dey, N. (2022). Chapter 5—IoT and Medical Cyberphysical
Systems’ Road Map. In Primers in Biomedical Imaging Devices and Systems, Biomed‑
ical Sensors and Smart Sensing (pp. 87–108). Academic Press. https://doi.org/10.1016/
B978-0-12-822856-2.00008-3.
Puri, V., Kataria, A., Rani, S., & Pareek, P. K. (2023, September). DLT Based Smart Medical
Ecosystem. In 2023 International Conference on Network, Multimedia and Information
Technology (NMITCON) (pp. 1–6). IEEE.
Rani, S., Kataria, A., Kumar, S., & Tiwari, P. (2023). Federated Learning for Secure IoMT-
Applications in Smart Healthcare Systems: A Comprehensive Review. Knowl‑
edge-Based Systems, 110658.
Rani, S., Kumar, S., Kataria, A., & Min, H. (2023). SmartHealth: An Intelligent Framework to
Secure IoMT Service Applications Using Machine Learning. ICT Express.
Rani, S., Mishra, A. K., Kataria, A., Mallik, S., & Qin, H. (2023). Machine Learning-Based
Optimal Crop Selection System in Smart Agriculture. Scientific Reports, 13(1), 15997.
Renu, N. (2021). Technological Advancement in the Era of COVID-19. SAGE Open Medicine,
9, 20503121211000912.
Romero, L. E., Chatterjee, P., & Armentano, R. L. (2016). An IoT Approach for Integra-
tion of Computational Intelligence and Wearable Sensors for Parkinson’s Disease
Diagnosis and Monitoring. Health Technology, 6, 167–172. https://doi.org/10.1007/
s12553-016-0148-0.
Shin, M., & Joe, I. (2015, July). An Indoor Localization System Considering Channel Inter��-
ference and the Reliability of the RSSI Measurement to Enhance Location Accuracy. In
Proceedings of the 2015 17th International Conference on Advanced Communication
Technology (ICACT), IEEE, PyeongChang, Korea, pp. 583–592.
Sun, Y., Lo, F. P. W., & Lo, B. (2019). Security and Privacy for the Internet of Medical Things
Enabled Healthcare Systems: A Survey. IEEE Access, 7, Article ID 183339–183355.
https://doi.org/10.1109/ACCESS.2019.2960617.
Tang, Q., Tummala, N., Gupta, S. K., & Schwiebert, L. (2005). Communication Scheduling to
Minimize Thermal Effects of Implanted Biosensor Networks in Homogeneous Tissue.
IEEE Transactions on Biomedical Engineering, 52(7), 1285–1294.
Venu, N., Arunkumar, A., &Vaigandla, K. (2022). Investigation on Internet of Things (IoT):
Technologies, Challenges and Applications in Healthcare. International Journal of
Research, 11, 143–153.
Weber, S. B., Stein, S., Pilgermann, M., & Schrader, T. (2023). Attack Detection for Medical
Cyber-Physical Systems–A Systematic Literature Review. IEEE Access, 11, 41796–
41815. https://doi.org/10.1109/ACCESS.2023.3270225.
Yuce, M. (2010). Implementation of Wireless Body Area Networks for Healthcare Sys-
tems. Sensors and Actuators A: Physical, 162, 116–129. https://doi.org/10.1016/j.
sna.2010.06.004.
17 Leveraging Web 3.0 to
Develop Play-to-Earn
Apps in Healthcare
using Blockchain
Yogesh Kisan Mali, Vijay Rathod,
Sweta Dargad, and Jyoti Yogesh Deshmukh
17.1 INTRODUCTION
Medical services frameworks were made to address our kin’s well-being prerequi-
sites; however, as our populace ages, so do the demands on efficiency Khatri et al.,
2021. Moreover, the worth of constant information is apparent, as in the case of coro-
navirus. Corresponding to coronavirus, data on a patient’s well-being (like tempera-
ture or side effects) is extremely useful. The aging population and the prevalence of
chronic diseases have increased health awareness and the demand for better patient
care. Today, as opposed to in the past, people’s attitudes toward healthcare services
are more patient-centered. Recently, patient-centered and hospital-centered health-
care has lost favor to mobile and electronic healthcare systems, which have since
developed into a universal healthcare system. With ongoing mechanical headways
like the Web of Clinical Things (part of the IoMT), it is presently conceivable to
productively and immediately acquire basically a wide range of market knowledge
Zhang et al., 2016.
The contemporary decentralization mechanism of Blockchain offers reliable
answers to the security and dependability problems in the healthcare sector. The
absence of intermediariesis is another compelling feature of blockchain technol-
ogy. In recent years, blockchain has been utilized to create new patterns and routes
beyond cryptocurrency Deisenroth et al., 2013. This would be another speedup of
conveyance without the utilization of brokers, and it very well may be the entry point
to medical care. Reconciliation of blockchain innovation into medical services appli-
cations, considering all protection-related issues, the unwavering quality of safety,
and patient and electronic well-being record access. In the computerized age, the uti-
lization of blockchain innovation in the medical care industry is explosive. Due to its
true capacity, blockchain innovation offers a promising answer for different issues,
including digital currencies (Jain et al., 2020), business and money, protection, pub-
licizing, and copyright security. Miniature exchanges, the creation and move of
advanced resources, decentralized trade, savvy agreements, and agreement systems
are portions of the potential affected by innovation right now.
17.2 RELATED WORK
Blockchain can be utilized to engineer distributed exchanges in a way that is savvy,
safe, and productive. As a level of innovation that has changed numerous ventures,
blockchain has the ability to change the medical services industry. This chapter’s goal
is to fundamentally assess 50 articles on blockchain-based well-being frameworks that
were distributed somewhere in the range of 2015 and 2020 (Clauson et al., 2018). Of
these, 36 were diary articles, seven were from meetings, four were from various dis-
cussions, three were from classes, and one was a part from a book. This report provides
answers to three important questions. First, what are the latest technical developments
in healthcare blockchain application development? Second, how can this systematic
study help us better comprehend the possibility of applying blockchain-based tech-
nology to the healthcare industry? Third, what are the key obstacles to implementing
blockchain as a solution in the healthcare industry (Khatri et al., 2021)?
These days, healthcare frameworks are making an effort to offer centralized gen-
eral healthcare administrations. Due to the high expenses, vast scope measures, and
little assets, the frameworks are frequently in danger of failing. A centralized cloud-
based system is used in the current context. The stored data is at danger when a cen-
tralized system is employed because security is the primary priority (Bhambri and
Gupta, 2017). The entire database becomes easily accessible in the event of a single
breach in the centralized system. A blockchain, which is a decentralized network for
data storage, can resolve this issue: The blocks on the blockchain contain unchanging
and secure information. In this study, a system that gives the patient total authority
over his medical records is introduced. It primarily consists of three roles: manage-
ment, patient, and doctor. The patient has exclusive control over his or her medical
records, providing the power to access those documents (Thippeswamy et al., 2020).
Blockchain is gaining traction and is currently one of the most fundamen-
tal subject areas. First, blockchain is introduced, and then current studies that
Leveraging Web 3.0 to Develop Play-to-Earn Apps using Blockchain 245
fit with blockchain developments are outlined (Kaur et al., 2023). Despite crit-
ics’ concerns about its flexibility, security, and supportability, it has significantly
altered many people’s way of life in several regions due to its profound influence
on businesses and organizations. Applications for block chains include those in
budgetary, human services, transportation, and risk management, as well as open
and social administrations and the Internet of Things (IoT). Several studies are
focused on the use of the blockchain information structure in various applications
(Devibala, 2019).
We will utilize AI and block-anchor innovation to resolve issues with medical
services information the executives in this review. With the help of AI, extricating
just the appropriate information from the data is possible. This is finished using
prepared calculations (Deisenroth et al., 2013). The reliability of trade information
turns into a test after this information has been put away. This is where block-
chain innovation is valuable. Blockchain innovation’s agreement guarantees that the
information is bona fide and the exchanges are secure (Bhambri et al., 2019a). By
putting the patient at the focal point of the medical services framework and upgrad-
ing the protection and interoperability of well-being information, blockchain inno-
vation can possibly further develop medical services the executives. This chapter
primarily focuses on leveraging Blockchain technology to address healthcare data
management issues while also incorporating certain crucial aspects using machine
learning Jain et al., 2020.
A recent development called blockchain technology gives host systems many of
the features just discussed. However, it’s significant to appreciate and make sense of
the worth of block-fasten innovation corresponding to the Indian medical services
framework (Yaqoob et al., 2021). Moreover, it’s essential to survey the fundamental
partners’ requirements for applying blockchain innovation to the Indian medical
care framework, such as in credit prioritization, customization, or plan contempla-
tions (agreement component, the sort of blockchain, brilliant agreements, and so
on). There have been different examinations of blockchain applications in Indian
medical services, but they miss the mark on the clear comprehension of the require-
ments of the partners. After talking with partners, we utilize the worth-centered
figuring structure to settle the previously mentioned research presumption. From the
partner connections that add to the essential objective, we decide on crucial goals
and vital targets. Given input from the domains of human specialists, as well as
the conduct and applications requirements from a partner perspective, this is a spe-
cialty work with a huge logical commitment to the data frameworks of the reception
of blockchain innovation in the Indian medical services biological system (Shukla
et al., 2021).
17.3 EXPERIMENTAL METHODOLOGY
17.3.1 Key Blockchain Technology Features
Six blockchain features that have the potential to significantly improve current
healthcare systems are shown in Figures 17.1 and 17.2. The following subsections
provide commentary.
246 Computational Intelligence in Biomedical and Health Informatics
17.3.1.1 Decentralization
Most of existing medical care establishments and offices are focused on unified
frameworks, which overwhelm one specific association. The incorporated model has
various serious downsides, for example, a weak link that can result from misfortune
or noxious plan, or any purposeful or unintentional glitch at the highest point of the
progressive system that unfavorably affects the whole medical services framework
Zhang et al., 2016.
Blockchain empowers decentralization, which moves power away from a solitary
or focal power (Rani et al., 2023). Thus blockchain turns into a heartier, compel-
ling, and vote-based innovation. By empowering the formation of new stages that let
patients handle their information, blockchain can assist to improve patient informa-
tion security and access to health data (Bhambri et al., 2019b). This helps to under-
mine the current healthcare system’s hierarchical structure.
17.3.1.2 Translucence
One of the most captivating parts of blockchain innovation is straightforwardness.
Straightforwardness in well-being information can add to the making of a completely
auditable and real record of exchanges. Given the medical services industry’s current
information, the board techniques can’t offer protection, security, and straightfor-
wardness at the same time. As well as maintaining more noteworthy receptiveness,
blockchain likewise ensures protection and awards approved command over medi-
cal services information in an equal way. On the open blockchain, any transaction
relating to health is searchable and traceable. Blockchain technology’s high level
of transparency enables healthcare organizations to have complete knowledge of a
medicine’s contents, manufacturing conditions, and workflow through wholesalers,
distributors, resellers and to customers. Healthcare services might surely be more
effective with greater transparency. Transparency on the blockchain is made possible
via encryption and control techniques.
17.3.1.3 Immutability
Due to their vulnerability to hacking and data theft, one of the main issues with
the present centralized healthcare systems is the immutability of healthcare data.
Another intriguing aspect of blockchain innovation is changelessness. It alludes to a
block-tie record’s ability to stay unaltered and unapproachable. This striking trade-
mark can overhaul and change the inspecting system into a speedy, powerful, and
reasonable methodology. Also, it can increment trust in and ensure the uprightness
of well-being information used and shared by clinical associations. Blockchain’s per-
manence is made conceivable through cryptographic hashing (Singh et al., 2004). All
exchanges are recorded on computerized blocks, and each blockchain has a hash that
is produced utilizing the hash of the past block and the recently added data.
status, blockchain ensures the provenance of health data. The reliability of previous
health records stored on blockchain can be improved for data validation and audit-
ing needs. Blockchain can protect healthcare systems from unauthorized access and
modification, hence ensuring the provenance of protected health data. Additionally, it
makes reliable traceability possible in the healthcare sector. Blockchain timestamps
transactions by computing provenance record hash values, which are then sent to
consensus nodes to maintain a consistent record of all valid transactions.
FIGURE 17.3 Advantages of utilizing blockchain innovation for medical care information
the executive’s frameworks.
and other data. This makes it workable for clinical specialists to treat patients prac-
tically, speedily, and fittingly. Healthcare professionals can have a thorough under-
standing of patients’ medical histories due to blockchain technology. All information
recorded on a blockchain is secure, transparent, and unchangeable.
17.4 OPPORTUNITIES
In this segment, we briefly go over how blockchain innovation, which is summed up
and shown in Figure 17.4, can assist with smoothing out medical services informa-
tion the board strategies by achieving massive changes.
Blockchain is a promising innovation that, in contrast with customary billing prac-
tices that normally involve lengthy delays in collections, can make the installment
cycle impressively less difficult and safer. Specifically, past payment techniques used
to make it significantly harder to pay the costs of protection claims. By keeping all
of the information in an unchanging way utilizing blockchain, these limitations can
be eliminated, permitting the insurance agency to settle accounts more rapidly while
utilizing less assets, cash, and time.
TABLE 17.1
Rundown of the Difficulties alongside Their Causes and Rules
We can build a more open, safe, and rewarding environment by utilizing the potential
of blockchain, Web 3.0, and play-to-earn healthcare games. Blockchain technology
promotes active engagement in the healthcare industry and improves the gaming
experience while ensuring trust, fairness, and decentralization.
254 Computational Intelligence in Biomedical and Health Informatics
17.6.1 Case Study
Here is a sample of Solidity code that illustrates how a straightforward play-to-earn
healthcare app is implemented on the Ethereum blockchain:
// SPDX1-License-Identifiers: MITD
Pragma1 solidity ^0.8.0;
contract health_care_Play_To_Earn {
struct persons {
uint258 id;
uint258 play_Tokens;
}
mapping (address => Patient) public patients;
address[] public person_Addresses;
event Play_Tokens_Earned (address indexed person_Address, uint258 play_
Tokens);
constructor() {
// Contract initialization
}
function enroll_person(uint258 id) external {
require(persons[msg.sender].id == 0, “Patient already enrolled”);
pesrsons[msg.sender] = Patient(id, 0);
persons_Addresses.push(msg.sender);
}
function earn_Play_Tokens(uint258 tokens) external {
require(tokens > 0, “Number of tokens must be greater than zero”);
require(persons[msg.sender].id!= 0, “Patient not enrolled”);
persons[msg.sender].play_Tokens += tokens;
emit Play_Tokens_Earned(msg.sender, tokens);
}
function get_Patient_Count() external view returns (uint256) {
return patient_Addresses.length;
}
}
The patient’s ID and the amount of play tokens they have accumulated are
addressed by the Patient struct. Patient locations are planned to the suitable
Patient struct utilizing the patient’s planning.
Leveraging Web 3.0 to Develop Play-to-Earn Apps using Blockchain 255
Patients can sign up for the play-to-earn app by submitting their ID using the
enroll_Patient_function. It makes sure a patient can enlist only once.
Patients can earn play tokens by specifying the number of tokens obtained
using the earn_Play_Tokens function. The procedure verifies that the patient
is registered and that there are more tokens than zero. The acquired tokens
are subsequently added to the patient’s account, and an event is released to
alert interested parties.
The get_Patient_Count function provides the total number of patients who
have been enrolled.
This code can be used as a starting point to construct a play-to-earn healthcare
app using Solidity on the Ethereum network.
17.7 CONCLUSIONS
In this book chapter, we introduced savvy conversations on the joining of block-
chain with medical services frameworks. We examined how utilizing blockchain
for medical care enterprises can prompt overseeing well-being information in a
decentralized, straightforward, open, recognizable, auditable, trusted, and secure
way. Likewise, blockchain gives an assurance of permanence and sealed well-being
information stockpiling. We examined the highlights and benefits of blockchain
innovation to demonstrate how it can open its maximum capacity for medical care
information the executives. We have likewise examined the key open doors pre-
sented by blockchain by utilizing robustness code and how play-to-procure applica-
tions can be applied to medical services. We introduced a contextual investigation to
show how blockchain innovation has worked with and supplemented different med-
ical care frameworks. We recognized and talked about the basic open exploration
challenges preventing the far and wide reception of blockchain innovation in medi-
cal care businesses. We reason that blockchain can possibly reshape and change the
256 Computational Intelligence in Biomedical and Health Informatics
REFERENCES
Bhambri, P., & Gupta, O. P. (2017). Applying distributed processing for different distance
based methods during phylogenetic tree construction. Asian Journal of Computer Sci‑
ence and Information Technology, 7(3), 57–67.
Bhambri, P., Sinha, V. K., Dhanoa, I. S., & Kaur, J. (2019a). Genome DNA sequence match-
ing using HBM algorithm. International Journal of Control and Automation, 12(5),
531–539.
Bhambri, P., Sinha, V. K., & Jaiswal, M. (2019b). Change in iris dimensions as a potential
human consciousness level indicator. International Journal of Innovative Technology
and Exploring Engineering, 8(9S), 517–525.
Clauson, K. A., Breeden, E. A., Davidson, C., & Mackey, T. K. (2018). Leveraging blockchain
technology to enhance supply chain management in healthcare: an exploration of chal-
lenges and opportunities in the health supply chain. Blockchain in Healthcare Today, 1.
https://doi.org/10.30953/bhty.v1.20
Deisenroth, M. P., Fox, D., & Rasmussen, C. E. (2013). Gaussian processes for data-efficient
learning in robotics and control. IEEE Transactions on Pattern Analysis and Machine
Intelligence, 37(2), 408–423.
Devibala, A. (2019, February). A survey on security issues in IoT for blockchain healthcare.
In 2019 IEEE International Conference on Electrical, Computer and Communication
Technologies (ICECCT) (pp. 1–7). IEEE.
Jain, S., Anand, A., Gupta, A., Awasthi, K., Gujrati, S., & Channegowda, J. (2020, February).
Blockchain and machine learning in health care and management. In 2020 International
Conference on Mainstreaming Block Chain Implementation (ICOMBI) (pp. 1–5). IEEE.
Kaur, D., Singh, B., & Rani, S. (2023). Cyber security in the metaverse. In Handbook of Research
on AI-Based Technologies and Applications in the Era of the Metaverse (pp. 418–435).
IGI Global.
Khatri, S., Alzahrani, F. A., Ansari, M. T. J., Agrawal, A., Kumar, R., & Khan, R. A. (2021).
A systematic analysis on blockchain integration with healthcare domain: scope and chal-
lenges. IEEE Access, 9, 84666–84687.
Puri, V., Kataria, A., Rani, S., & Pareek, P. K. (2023, September). DLT based smart medical
ecosystem. In 2023 International Conference on Network, Multimedia and Information
Technology (NMITCON) (pp. 1–6). IEEE.
Rani, S., Kataria, A., Kumar, S., & Tiwari, P. (2023). Federated learning for secure IoMT-
applications in smart healthcare systems: a comprehensive review. Knowledge-Based
Systems, 110658.
Rani, S., Kumar, S., Kataria, A., & Min, H. (2023). SmartHealth: an intelligent framework to
secure IoMT service applications using machine learning. ICT Express, 48, 1–6. https://
doi.org/10.1016/j.icte.2023
Rani, S., Mishra, A. K., Kataria, A., Mallik, S., & Qin, H. (2023). Machine learning-based
optimal crop selection system in smart agriculture. Scientific Reports, 13(1), 15997.
Leveraging Web 3.0 to Develop Play-to-Earn Apps using Blockchain 257
Shukla, R. G., Agarwal, A., & Shekhar, V. (2021). Leveraging blockchain technology for
Indian healthcare system: an assessment using value-focused thinking approach. The
Journal of High Technology Management Research, 32(2), 100415.
Singh, P., Singh, M., & Bhambri, P. (2004, November). Interoperability: a problem of com��-
ponent reusability. In Paper Presented at the International Conference on Emerging
Technologies in IT Industry, 60.
Thippeswamy, M. N., Kiran, B. M. S., Tanksali, P. R., Hegde, M., & Naik, P. R. (2020, Octo-
ber). Block chain based medical reports monitoring system. In 2020 Fourth International
Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC) (pp. 222–
227). IEEE.
Tondon, N., & Bhambri, P. (2017). Novel approach for drug discovery. International Journal
of Research in Engineering and Applied Sciences, 7(6), 28–46.
Yaqoob, I., Salah, K., Jayaraman, R., & Al-Hammadi, Y. (2021). Blockchain for healthcare
data management: opportunities, challenges, and future recommendations. Neural Com‑
puting and Applications, 1–16.
Zhang, J., Xue, N., & Huang, X. (2016). A secure system for pervasive social network-based
healthcare. IEEE Access, 4, 9239–9250.
18 Advancements in
Modelling, Imaging,
and Simulation of
Cardiovascular Diseases
A Technological Revolution
in Modern Healthcare
S. Sharmila, M. Nirmala, D. Somasundaram,
and M. Menagadevi
been worries about the harm to children and the use of pointless scans because they
depended on ionizing radiation (Rieffel et al., 2015).
Although MRI is costlier than CT, it is particularly helpful for visualizing soft
tissues without using ionizing radiation. Despite the expense of MRI and the fact
that action planning precludes screening submissions, the assistance and promise
of MRI-aided diagnosis with therapeutic planning are acknowledged, as well as the
numerous MRI-related ways of providing physical and practical information.
Over the past four decades, nuclear cardiology has developed, demonstrating an
inventive and imaginative shift from idiosyncratic perceptions of plane images with
subpar radiotracers toward a quantitative method based on digital data. Myocardial
images are becoming a progressively significant approach for identifying and
risk-stratifying individuals for further intervention, medicinal treatment, or more
interventional therapy with coronary angiography and possibly revascularization.
Planar imaging has advanced quickly, as have individual photon emission tomogra-
phy, positron emission tomography (PET), and magnetic resonance imaging. Novel
radiotracers that demonstrate the basic molecular physiology of various cardiac dis-
ease states have advanced and improved at a similarly impressive rate.
260 Computational Intelligence in Biomedical and Health Informatics
The use of imaging techniques like CT angiography (CTA) for estimation of pedi-
atric congenital heart disease (CHD) is crucial. These techniques are used to depict
composite cardiovascular anatomic aspects early on and after surgery, as well as
different post-treatment issues. CT can evaluate cardiac systemic and pulmonary
arterial issues (Dillman & Hernandez, 2009). Radiotherapists must be well-versed in
cardiovascular physiology and in surgical anatomy techniques. The goal of this chap-
ter is to investigate the role of computed tomography in the assessment of congenital
cardiovascular disease in young ones.
18.2 SIMULATION TOOL
Cardiovascular disease (CVD) prediction involves assessing the risk and progression
of various cardiovascular conditions, such as heart disease and stroke.
While there are no specific simulation tools designed solely for CVD prediction,
various computational models and software can assist in risk assessment and predic-
tion (Al’Aref et al., 2019). Here are some commonly used tools (shown in Figure 18.2)
and approaches for cardiovascular disease prediction.
When the relevant numbers for each risk factor are entered into the Framingham
Heart Study Risk Score Calculator, the calculator gives an estimated ten-year risk
percentage for developing a cardiovascular event (Bitton & Gaziano, 2010). This risk
percentage aids in establishing the necessity for lifestyle changes, preventive mea-
sures, or medical interventions. It is imperative to remember that the Framingham
Risk Notch is based on population-based data and provides a broad estimate of risk
(Jain & Bhambri, 2005). It may not capture individual variances or account for all
relevant risk variables. Therefore, it is always essential to consult a healthcare pro-
vider for a thorough evaluation and specific recommendations for cardiovascular
health Kaur et al. (2023).
18.2.2 QRISK
QRISK is a risk prediction algorithm for the cardiovascular system that considers a
variety of risk parameters such as ethnicity, BP, cholesterol, diabetes, smoking, and
BMI. It analyses the ten-year risk of developing a cardiovascular incident. QRISK
is a cardiovascular risk prediction system that calculates a ten-year probability of
acquiring cardiovascular events such as heart disease and stroke. It is intended to
estimate cardiovascular risk in the overall population and takes into account a num-
ber of risks that can lead to the development of cardiovascular disease.
The QRISK algorithm estimates ten-year probability of experiencing cardiovas-
cular by entering the pertinent values for each risk factor. This risk calculation aids
medical practitioners in determining whether measures like dietary changes, pre-
ventative care, and medical tracking are necessary. Updating the QRISK is a new
methodology to improve its accuracy in cardiovascular system prediction. Clinical
practice issued in the United Kingdom. Compared to earlier risk scoring systems, it
is a thoroughgoing assessment of cardiovascular risk because it takes into account
new criteria like ethnicity and BMI.
It’s crucial to remember that QRISK is a population-based tool, and although it
offers a useful prediction of cardiovascular risk, individual variances and extra risk
variables might not be adequately reflected (Rattan et al., 2005a). In order to receive
a customized assessment and advice on cardiovascular risk management, it is essen-
tial to consult with a healthcare professional periodically.
By inputting the relevant values for each risk factor, the Reynolds Risk Score
algorithm calculates an individual’s estimated ten-year risk of developing cardio-
vascular events. This risk estimation helps healthcare professionals assess the need
for interventions, such as lifestyle modifications, preventive treatments, or medical
monitoring, specifically tailored for women.
The Reynolds Risk Score is designed to provide a more accurate evaluation of car-
diovascular risk in females by considering additional factors beyond traditional risk
factors like age and cholesterol levels. By incorporating CRP and the genetic history
of early heart attack, it aims to capture inflammation and genetic predisposition,
respectively, which can impact cardiovascular risk in women.
Specifically, Reynolds Risk Score is developed for females rather than for men. As
with any risk scoring system, consulting a healthcare professional is recommended
to interpret the results, discuss individual risk factors, and formulate appropriate pre-
ventive strategies.
18.2.4.1 Some of the Common Risk Factors for These Risk Calculators
Age: The age of the individual in years
Sex: Male or female
Ethnicity: Different ethnicities with varying risk profiles
Smoking Status: Whether the individual person is a chain smoker or a
nonsmoker
Modelling, Imaging, and Simulation of Cardiovascular Diseases 263
Fluid Flow: CFD can predict the flow behavior of the precursor gases inside
the CVD reactor. It can simulate the velocity, pressure, and temperature
distributions, as well as identify regions of recirculation or stagnation.
Understanding the fluid flow patterns helps optimize the reactor design for
uniform deposition and efficient gas transport.
Mass Transport: CFD simulations can model the transport of precursor gases
within the CVD reactor. This includes the diffusion and advection of gas-
eous species, as well as the adsorption and desorption of these species on
the substrate surface. CFD can provide information on a species’ concen-
tration profiles and residence times, aiding in optimizing precursor delivery
and deposition rates (Rani et al., 2023).
Chemical Reactions: CFD can incorporate reaction kinetics to simulate the
chemical reactions occurring during CVD processes. By considering the
gas phase and surface reactions, CFD can predict the species’ conversions,
reaction rates, and deposition rates. This enables the study of reaction mech-
anisms and the optimization of process conditions to achieve the desired
film properties.
Heat Transfer: Conduction, convection, and radiation are some of the heat
transmission modes that can be modelled in CFD simulations for the CVD
reactor. Controlling the deposition process and ensuring the thermal sta-
bility of the substrate and films require an understanding of temperature
distribution and heat transfer rates (Rani et al., 2023).
Reactor Design Optimization: CVD reactor design and operational param-
eters can be improved using CFD simulations. With the aid of CFD, it is
possible to determine the ideal circumstances for attaining uniform deposi-
tion, cutting down on the amount of time it takes for it to happen, and max-
imizing process effectiveness by comparing various reactor geometries,
gas inlet configurations, temperature profiles, and other characteristics.
Accurate modelling of fluid characteristics, boundary conditions, reaction
kinetics, and heat transfer mechanisms is necessary for CFD simulations of
CVD operations. To guarantee the CFD models’ accuracy and dependabil-
ity, experimental data validation is crucial.
266 Computational Intelligence in Biomedical and Health Informatics
18.4 DATA-DRIVEN MODELLING
In order to find insights, patterns, and predictive models about cardiovascular health,
data-driven modelling for cardiovascular disease (CVD) makes use of massive data-
sets and sophisticated analytical methods (Dritsas & Trigka, 2023). To enhance the
risk assessment, early identification, and personalized treatment of CVD, this strat-
egy makes use of the vast amount of data that is currently available from electronic
health records, clinical trials, medical imaging, genetic research, wearable devices,
and other sources (Kataria et al., 2023, July).
The key data-driven modelling techniques (shown in Figure 18.5 used in CVD
research include:
Risk Prediction: AI models can review patient data from the patient’s medical
file, test results, genetic information, and lifestyle choices to ascertain the
risk of CVD. These models can provide personalized risk scores and sup-
port physicians in identifying high-risk patients who can gain from early
intervention and preventive measures.
Medical Imaging Analysis: AI algorithms can evaluate medical imaging data
from MRI scans, angiograms, and echocardiograms to detect and quantify
cardiovascular issues. AI-based picture analysis can help with early detec-
tion of diseases like coronary artery disease, heart failure, and valve issues,
allowing for rapid medication and intervention.
ECG Analysis: Arrhythmias, ischemia changes, and other cardiac abnormal-
ities can be found using AI models that evaluate electrocardiogram (ECG)
data. Atrial fibrillation, myocardial infarction, and QT prolongation are just
a few of the disorders that can be detected and monitored with AI-powered
ECG analysis tools. AI-based decision support systems can help doctors
manage and plan for the treatment of cardiovascular disease. These systems
examine patient data, clinician suggestions, and research-based information
to make recommendations on medication selection, dose changes, and ther-
apies catered to specific patients.
Remote Monitoring and Wearable Devices: In order to assess heart rate,
exercise levels, and other physiological indicators, wearable technology like
smartwatches and fitness trackers can collect data that AI systems can ana-
lyze. Real-time analysis of this data can help prevent cardiac problems from
happening by allowing early diagnosis and by providing tailored feedback
to encourage healthy habits.
Natural Language Processing: Information can be retrieved from and pro-
cessed using AI techniques like natural language processing from clini-
cal notes, scholarly papers, and electronic health records. Automated data
extraction, processing, and analysis make large-scale research and the syn-
thesis of evidence possible (Puri et al., 2023, September).
Drug Discovery and Development: AI facilitates the drug development process
by discovering pharmacological targets, forecasting the efficacy and safety of
potential drug candidates, and enhancing medication formulations. AI-based
algorithms have the ability to examine molecular structures, genetic data,
and clinical outcomes to guide precision medical techniques in the treatment
of CVD (Kam et al., 2023). The use of AI in improving CVD care has a lot
of potential, but it should always be combined with clinical judgment and
subject matter expertise. Validation, transparency, and interpretability are
crucial for ensuring AI models’ reliability and uptake in clinical practice.
Modelling, Imaging, and Simulation of Cardiovascular Diseases 269
imaging data into the clinician’s field of view. It increases procedural effec-
tiveness and security.
Patient Education and Engagement: AR and VR technologies can be used
to inform patients about cardiovascular diseases and therapies. Patients
can better understand their condition, make educated decisions, and follow
treatment programs if the cardiovascular system is visualized and disease
processes are explained. Patients learn more effectively in surroundings that
feature interactive AR and VR activities.
Rehabilitation and Exercise: Cardiovascular rehabilitation and fitness pro-
grams can benefit from the use of AR and VR. These technologies can
motivate patients to participate in physical exercises and follow rehabili-
tation guidelines by generating engaging and compelling virtual environ-
ments. During workouts, they can keep an eye on progress, offer feedback,
and monitor performance.
Telemedicine and Remote Consultations: For patients with cardiovascular
diseases, AR and VR can facilitate remote consultations and telemedicine.
These technologies enable doctors to virtually examine patients, view their
data remotely, and direct them through self-evaluations. The necessity for
in-person visits is diminished, and specialized care is easier to access.
Research and Data Visualization: Researchers can use AR and VR to visu-
alize and analyze complex cardiovascular data. Researchers may examine
complex relationships, spot trends, and learn more about disease causes by
transforming massive datasets into interactive 3D visualizations (Aggoune
et al., 2023). It makes data-driven exploration and research easier. The
management of cardiovascular illness could be improved, patient outcomes
could be improved, and the field’s research and teaching could advance
thanks to AR and VR technology. However, it is crucial to make sure that
these technologies are properly incorporated into clinical workflows, eval-
uated for accuracy and safety, and utilized in combination with recognized
medical standards and best practices.
Data Quality and Accessibility: Accurate modelling and simulation depend
on the availability of high-quality and diverse data. Ensuring standardized
data formats, integrating data from multiple sources, and addressing data
privacy issues are all difficulties. To increase modelling precision and gen-
eralizability, future initiatives should concentrate on creating reliable data
repositories, harmonizing data standards, and encouraging data sharing.
Computational Complexity: Complex multiscale and multiphysics sim-
ulations are frequently used in CVD modelling. It is difficult to achieve
computing efficiency while correctly capturing physiological processes.
The development of quicker and more scalable algorithms, the use of high-
performance computing resources, and the optimization of computational
workflows to support real-time or near-real-time simulations are possible
future developments.
Personalized Modelling: Modelling and simulating CVD on an individual
basis is necessary for precision medicine. Physiological indicators, genetic
data, and patient-specific data like medical images must all be incorporated
Modelling, Imaging, and Simulation of Cardiovascular Diseases 271
into the modelling framework in order to achieve this. The risk assessment,
treatment planning, and outcome prediction capabilities of customized
modelling can all be improved, leading to interventions that are ultimately
more targeted and effective.
Uncertainty and Validation: It is crucial for the clinical application of CVD
models to validate their accuracy and dependability. Modelling uncertainty
and creating strong validation frameworks are continuous difficulties. The
integration of uncertainty quantification techniques, the use of extensive clin-
ical data for validation, and the execution of prospective studies to evaluate
the clinical impact of modelling predictions should be the future directions.
Integration of Multimodal Data: By combining several imaging modalities,
such MRI, CT, and ultrasound, CVD modelling might benefit from the col-
lection of complementing data. It is possible to acquire a deeper knowledge
in disease development and therapy retort by merging imaging data with
clinical data information (Chugh et al., 2023), such as genetic profiles along
with biomarkers. Creating approaches for multimodal data fusion and inte-
gration will improve the precision and clinical utility of CVD modelling.
Translational Impact: It is still difficult to bridge the knowledge gap between
clinical practice and CVD modelling research. Future work should concen-
trate on creating user-friendly modelling tools that clinicians can quickly
adopt, providing interpretability and practical insights from modelling out-
comes, and proving the clinical utility and economic viability of modelling
approaches through rigorous clinical studies.
Ethical Considerations: As modelling and simulation technologies develop,
privacy, data security, and patient consent issues become more crucial. For
CVD modelling approaches to be developed and used in the future, it is
essential that moral standards and laws be in place to safeguard patient
rights and privacy. It takes the combined efforts of researchers, doctors,
engineers, and policymakers to address the difficulties in modelling imag-
ing and the simulation of cardiovascular disease.
REFERENCES
Aggoune, A., & Benratem, Z. (2023, March). ECG data visualization: Combining the power
of Grafana and InfluxDB. In 2023 International Conference on Advances in Electronics,
Control and Communication Systems (ICAECCS) (pp. 1–6). Blida, Algeria: IEEE.
Al’Aref, S. J., Anchouche, K., Singh, G., Slomka, P. J., Kolli, K. K., Kumar, A., . . . & Min,
J. K. (2019). Clinical applications of machine learning in cardiovascular disease and its
relevance to cardiac imaging. European Heart Journal, 40(24), 1975–1986.
Bhambri, P., & Gupta, S. (2005, March). A survey & comparison of permutation possibility of
fault tolerant multistage interconnection networks. In Paper Presented at the National
Conference on Application of Mathematics in Engineering & Technology, 13.
Bitton, A., & Gaziano, T. (2010). The Framingham heart study’s impact on global risk assess� -
ment. Progress in Cardiovascular Diseases, 53(1), 68–78.
Chan, Y. K., Cheng, C. Y., & Sabanayagam, C. (2023). Eyes as the windows into cardiovascu�-
lar disease in the era of big data. Taiwan Journal of Ophthalmology, 13(2), 151.
Chen, S., Campbell, J., Spain, E., Woodruff, A., & Snider, C. (2023). Improving the represent�-
ativeness of the tribal behavioral risk factor surveillance system through data integration.
BMC Public Health, 23(1), 273.
Chugh, M., Anantavrasilp, I., & Thiemjarus, S. (2023, June). Hybrid multi-model fuzzy
ensemble approach for cardiovascular diseases detection. In 2023 IEEE World AI IoT
Congress (AIIoT) (pp. 454–459). Seattle, WA: IEEE.
Dash, S. S., Tiwari, S., & Nahak, K. (2023). Revolutionizing cardiovascular disease preven-
tion with machine learning: A comprehensive review. Journal of Data Acquisition and
Processing, 38(2), 2429.
Dillman, J. R., & Hernandez, R. J. (2009). Role of CT in the evaluation of congenital cardio-
vascular disease in children. American Journal of Roentgenology, 192(5), 1219–1231.
Dritsas, E., & Trigka, M. (2023). Efficient data-driven machine learning models for cardiovas-
cular diseases risk prediction. Sensors, 23(3), 1161.
Fan, J., Wang, X., Wu, L., Zhou, H., Zhang, F., Yu, X., . . . & Xiang, Y. (2018). Comparison
of support vector machine and extreme gradient boosting for predicting daily global
solar radiation using temperature and precipitation in humid subtropical climates: A case
study in China. Energy Conversion and Management, 164, 102–111.
Jain, V. K., & Bhambri, P. (2005). Fundamentals of Information Technology & Computer Pro‑
gramming. New Delhi, India: S. K. Kataria & Sons.
Joy, S. I., Kumar, K. S., Palanivelan, M., & Lakshmi, D. (2023). Review on advent of artificial
intelligence in electrocardiogram for the detection of extra-cardiac and cardiovascular
disease [Revue sur l’avènement de l’intelligence artificielle dans l’électrocardiogramme
pour la détection des maladies extra-cardiaques et cardiovasculaires]. IEEE Canadian
Journal of Electrical and Computer Engineering, 46(2), 99–106.
Modelling, Imaging, and Simulation of Cardiovascular Diseases 273
Kakadiaris, I. A., Vrigkas, M., Yen, A. A., Kuznetsova, T., Budoff, M., & Naghavi, M. (2018).
Machine learning outperforms ACC/AHA CVD risk calculator in MESA. Journal of the
American Heart Association, 7(22), e009476.
Kam, A., Loo, S., & Lee, S. M. Y. (2023). Editorial on special issue “natural products for drug
discovery and development”. Processes, 11(6), 1784.
Kataria, A., Puri, V., Pareek, P. K., & Rani, S. (2023, July). Human activity classification
using G-XGB. In 2023 International Conference on Data Science and Network Security
(ICDSNS) (pp. 1–5). Tiptur, India: IEEE.
Kaur, D., Singh, B., & Rani, S. (2023). Cyber security in the metaverse. In Handbook of Research
on AI-Based Technologies and Applications in the Era of the Metaverse (pp. 418–435).
IGI Global, USA.
Lin, W., Hung, P. L., & Yueh, H. P. (2023, July). Design of an AR application to support stu-
dents with CVD in learning chemistry. In International Conference on Human-Computer
Interaction (pp. 232–240). Cham, Switzerland: Springer Nature.
Lu, J. K., Sijm, M., Janssens, G. E., Goh, J., & Maier, A. B. (2023). Remote monitoring tech-
nologies for measuring cardiovascular functions in community-dwelling adults: A sys-
tematic review. GeroScience, 1–12.
Mavrogeni, S., Pepe, A., Nijveldt, R., Ntusi, N., Sierra-Galan, L. M., Bratis, K., . . . & Cosyns,
B. (2022). Cardiovascular magnetic resonance in autoimmune rheumatic diseases:
A clinical consensus document by the European association of cardiovascular imag-
ing. European Heart Journal-Cardiovascular Imaging, 23(9), e308–e322.
Moradi, H., Al-Hourani, A., Concilia, G., Khoshmanesh, F., Nezami, F. R., Needham, S., . . . &
Khoshmanesh, K. (2023). Recent developments in modeling, imaging, and monitoring
of cardiovascular diseases using machine learning. Biophysical Reviews, 15(1), 19–33.
Pezhouman, A., Nguyen, N. B., Kay, M., Kanjilal, B., Noshadi, I., & Ardehali, R. (2023). Car-
diac regeneration–past advancements, current challenges, and future directions. Journal
of Molecular and Cellular Cardiology, 182, 75–85.
Puri, V., Kataria, A., Rani, S., & Pareek, P. K. (2023, September). DLT based smart medical
ecosystem. In 2023 International Conference on Network, Multimedia and Information
Technology (NMITCON) (pp. 1–6). Bengaluru, India: IEEE.
Ragavan, E., Hariharan, C., Aravindraj, N., & Manivannan, S. S. (2016). Real time water quality
monitoring system. International Journal Pharmaceutical Technology, 8(4), 26199–26205.
Rani, S., Kataria, A., Kumar, S., & Tiwari, P. (2023). Federated learning for secure IoMT-
applications in smart healthcare systems: A comprehensive review. Knowledge-Based
Systems, 110658.
Rani, S., Kumar, S., Kataria, A., & Min, H. (2023). SmartHealth: An intelligent framework to
secure IoMT service applications using machine learning. ICT Express, 48, 1–6. https://
doi.org/10.1016/j.icte.2023
Rani, S., Mishra, A. K., Kataria, A., Mallik, S., & Qin, H. (2023). Machine learning-based
optimal crop selection system in smart agriculture. Scientific Reports, 13(1), 15997.
Rattan, M., Bhambri, P., & Shaifali. (2005a, February). Information retrieval using soft computing
techniques. In Paper Presented at the National Conference on Bio-informatics Computing, 7.
Rattan, M., Bhambri, P., & Shaifali. (2005b, February). Institution for a sustainable civiliza��-
tion: Negotiating change in a technological culture. In Paper Presented at the National
Conference on Technical Education in Globalized Environment- Knowledge, Technol‑
ogy & The Teacher, 45.
Ridker, P. M., Buring, J. E., Rifai, N., & Cook, N. R. (2007). Development and validation of
improved algorithms for the assessment of global cardiovascular risk in women: The
Reynolds risk score. Jama, 297(6), 611–619.
Rieffel, J., Chitgupi, U., & Lovell, J. (2015). Recent advances in higher‐order, multimodal,
biomedical imaging agents. Small (Weinheim an der Bergstrasse, Germany), 11. https://
doi.org/10.1002/smll.201500735.
274 Computational Intelligence in Biomedical and Health Informatics
Shickel, B., Tighe, P. J., Bihorac, A., & Rashidi, P. (2017). Deep EHR: a survey of recent
advances in deep learning techniques for electronic health record (EHR) analysis. IEEE
Journal of Biomedical and Health Informatics, 22(5), 1589–1604.
Singh, P., Singh, M., & Bhambri, P. (2005, January). Embedded systems. In Paper Presented
at the Seminar on Embedded Systems, 10–15.
Walsh, R., Jurgens, S. J., Erdmann, J., & Bezzina, C. R. (2023). Genome-wide association
studies of cardiovascular disease. Physiological Reviews, 103(3), 2039–2055.
19 Blockchain-Enhanced
Convolutional
Neural Networks for
Efficient Detection
of Cardiovascular
Abnormalities
Shaik Karimullah, Fahimuddin Shaik,
D. Vishnu Vardhan, and Ch. Nagaraju
19.1 INTRODUCTION
Cardiovascular disease (CVD) is a primary global reason for a considerable num-
ber of deaths, and it is dubbed the “silent killer” due to its impact on the heart and
arteries, potentially leading to heart attacks and tissue damage (Abdeldjouad et al.,
2020). CVD has witnessed a 25% increase in overall death rates over the last century,
with males, particularly in middle or late life, being more vulnerable. Age, demogra-
phy, and ethnicity all influence the difficulty of CVD diagnosis. Electrocardiograms
(ECGs) are vital in the detection of cardiac issues because they provide visual repre-
sentations of the heart’s electrical activity. Machine learning (ML), particularly deep
learning (DL), has gained traction in research and a variety of applications, including
ECG signal interpretation (Alom et al., 2019). To extract features from ECG record-
ings, traditional ML approaches such as the discrete wavelet transform (DWT) and
Pan–Tompkins algorithm are employed, followed by classification algorithms such
as the support vector machine (SVM) and hidden Markov model (HMM). These
techniques, however, have problems in reliably categorizing ECG data (Amrit et al.,
2017). CNNs have the advantage of capturing complicated structures autonomously
from incoming data without considerable preprocessing (Bhambri and Bhandari,
2005). The importance of this proposal is to create an accurate automated model for
detecting cardiac disorders in ECGs using CNNs, which has the potential to reduce
misdiagnoses and enhance efficiency in primary care and major hospitals (Andreao
et al., 2006).
In addition, incorporating blockchain technology improves the confidentiality and
privacy of ECG data. Blockchain technology provides a decentralized, tamper-proof
ledger that protects the integrity and traceability of medical records. ECG data can
19.1.1.2 Significance
Blockchain’s popularity stems from its potential to enhance data security, privacy,
and interoperability, notably in healthcare. When integrated with ECG analysis, it can
overcome the limitations of standard machine learning models, improving the effi-
ciency and accuracy of cardiovascular problem identification (Bhambri et al., 2005a).
This study explores blockchain’s synergy with CNNs to create a robust and secure
ECG-based cardiovascular problem detection system (Liu et al., 2021). Blockchain
offers several advantages, including data immutability and integrity through decen-
tralized ledger technology, secure data sharing and access for authorized parties,
and simplified data sharing agreements via smart contracts, empowering patients to
control access to their medical information (Mitra et al., 2013).
19.1.2 Problem Statement
Detecting cardiovascular abnormalities accurately and efficiently is crucial for
managing cardiovascular disease (CVD). Traditional machine learning methods
for analyzing electrocardiogram (ECG) data have limitations in reliability and effi-
ciency (Kaur et al., 2023). This research addresses two key challenges: First, exist-
ing machine learning models for ECG analysis lack reliability, potentially leading
to misdiagnoses or missed diagnoses due to their reliance on manually extracted
features and classification algorithms. This compromises accuracy and efficiency,
putting patient outcomes at risk and burdening healthcare professionals (Puri et al.,
2023, September). Second, concerns over data security, privacy, and interoperabil-
ity arise in ECG data storage, sharing, and access control. Centralized systems are
Blockchain-Enhanced Convolutional Neural Networks 277
19.2 LITERATURE REVIEW
In previous studies, various techniques have been explored for cardiovascular dis-
ease (CAD) detection Rani et al. (2023). One approach incorporated multidomain
combinations of multichannel cardiac data, enhancing accuracy to 90.90% through
the addition of entropy to support vector machines (SVM) (Murray, et al., 1994). In
another study, cardiac echoes were captured using the imagined part of cross-power
spectral density (ICPSD) (Nourmohammadi-Khiarak et al., 2020). Oh et al. (2020)
introduced a hybrid method for predicting cardiovascular disease, achieving an 80%
accuracy rate with machine learning techniques. This method aims to assist phy-
sicians rather than replace them, especially in emergency situations. Furthermore,
a data mining technique combining an imperialist competitive algorithm and
K-nearest neighbor reached a 91% accuracy in identifying heart illness (Park et al.,
2008). A revolutionary system based on MLP and CNN networks achieved 88.7%
and 83.5% accuracy, respectively, in Pathak et al. (2020), while a fresh method incor-
porating several methodologies into a learning algorithm achieved 89.2% efficiency
in Pouyanfar et al. (2018). Rough sets (RS) with quantum neural networks (QNN)
achieved 91.7% accuracy in Ribeiro et al. (2020). Furthermore, in Rozenwald et al.
(2020), the K-nearest neighbor and genetic algorithm were used for heart disease
categorization, with an accuracy of less than 90%. Because existing approaches have
accuracies of less than 94%, a dynamic CNN methodology is presented to use opti-
mized multichannel cardiac sound signals for improved accuracy in cardiovascular
condition detection (Savalia et al., 2018).
The chapter focuses on machine learning techniques, namely convolutional neural
networks (CNNs), for diagnosing cardiovascular irregularities and investigates the
potential of blockchain technology in healthcare for data interoperability, privacy,
and security (Shaik et al., 2021). Traditional approaches for ECG signal categoriza-
tion, such as support vector machines (SVM) and hidden Markov models (HMM),
278 Computational Intelligence in Biomedical and Health Informatics
have shortcomings when compared to human cardiologists (Shaik et al., 2016). Recent
advances in CNNs have shown promise in autonomously extracting relevant fea-
tures from ECG data, with high accuracy achieved without extensive preprocessing
(Shaik et al., 2023). Blockchain’s potential in healthcare is recognized for preserving
data integrity and privacy via a decentralized, irrefutable ledger (Tarawneh et al.,
2019). Several studies have emphasized its advantages, such as secure medical record
exchange and access control (Tang et al., 2014). By using blockchain’s immutability
and decentralization for data protection and restricted access, combining blockchain
with CNNs has considerable potential for boosting efficiency and security in cardio-
vascular anomaly detection (Trevisan et al., 2020). However, little research has been
conducted on this combination (Vijayavanan et al., 2014).
guarantees the authenticity and reliability of the stored data, enhancing the
trustworthiness of the cardiovascular abnormality detection system.
7. Secure Sharing among Healthcare Providers, Researchers, and Patients:
Through smart contracts that enforce access control norms and approvals,
blockchain enables secure exchange of cardiovascular pictures among autho-
rized parties. Patients retain control by authorizing specified healthcare prac-
titioners or researchers to view their medical pictures, ensuring privacy, and
promoting secure, controlled collaboration, and information sharing.
8. Collaboration and Development of Decentralized Medical Image Data-
bases: The blockchain-enhanced CNN enables the establishment of decen-
tralized medical image databases to which healthcare practitioners and
researchers can input anonymized cardiovascular pictures for large-scale
collaborative analysis. The decentralized, redundant, and consensus-driven
structure of the blockchain assures secure and robust database upkeep.
19.4 QUANTITATIVE METRICS
Quantitative metrics include accuracy, positive anticipated value, sensitivity, speci-
ficity, negatively expected values, positive likelihood, negative likelihood, and so on.
19.4.1 Accuracy
Accuracy assessment involves evaluating the precision of measured variables in
equipment through multiple measurements, often aided by probability to enhance
precision. It calculates the ratio of correctly categorized or segmented pixels to the
total pixels in an image, as shown in Eqn. (19.1). Accuracy is derived from false neg-
ative, true positive, false positive, and true negative values.
(Tp + Tn )
Accuracy = (19.1)
Tp + Fp + Fn + Tn
19.4.2 Sensitivity
The sensitivity test measures the proportion of accurately classified positives as a
percentage of ill persons. In clinics, people’s illnesses are evaluated on a percent-
age basis; if the percentage has a value greater than the specificity, they are consid-
ered unwell. A test’s sensitivity is its capacity to appropriately discriminate patient
instances. It computes the ratio of real positive pixels to total positive pixels, and its
mathematical form is given in Eqn. (19.2).
Tp
Sensitivity = (19.2)
Tp + Fn
Blockchain-Enhanced Convolutional Neural Networks 281
19.4.3 Specificity
The test is capable of accurately defining healthy cases, calculating the proportion
of genuine negatives (Tn) in healthy instances, and measuring the proportion of sig-
nificant results (positives) that are appropriately described using Eqn. (19.3). This
can properly identify those who are not unwell. It computes the proportion of real
negative pixels to total negative pixels.
Tp
Specificity = (19.3)
Tp + Fn
An optimization algorithm selects optimal features from the fused signals by iter-
atively associating possible explanations until an optimal solution is reached. The
gradient descent optimization technique is utilized in this work to select the best fea-
tures from the fused ECG data, as shown in Figure 19.5. Following feature selection,
these features are extracted using a clustering approach. Clustering splits a set of
data points into groups, guaranteeing that data components within a single group are
more connected to one another than data elements in other groups. The optimized
ECG signals are segmented by magnitude using the K-means algorithm, which has
seven clusters. Maximum, mean, median, cross-entropy, and gradient are retrieved
from these clusters, as illustrated in Figure 19.6.
All collected features are fed into the classification procedure, which employs
CNN to classify cardiovascular diseases. The convolutional neural network is made
up of input, hidden, and output layers that learn and connect inputs and outputs. As
shown in Figure 19.7, the network modifies correlation-associated weights during
training using specific datasets. Following disease classification, results are validated
using characteristics such as cross-entropy and gradient. If the cross-entropy and
gradient values in the validation performance curve and training state approach zero,
the model is well-trained; otherwise, it requires more refining. A well-trained model
should align with or closely follow the best line, showing that training convergence
was effective. For classification tasks, cross entropy is used, and Figure 19.8 shows
the cross entropy and gradient values for patients 1 to 4.
The confusion matrix determines the performance of a classification technique.
The model’s total number of accurate and incorrect predictions is shown in a con-
fusion matrix. For each class, the proportion of accurate predictions is distributed
diagonally. Figure 19.9 shows the confusion matrix for four patients.
Blockchain-Enhanced Convolutional Neural Networks 285
Finally, the ROC curve is used to observe the effectiveness and strength of the
developed model. Receiver operating characteristics demonstrates the trade-off
among the true positive rate in addition to false positive rate. All the receiver operat-
ing characteristics are obtained after training, validation, and testing. AROC curva-
ture that is close to 1 specifies that the system is impeccable, as shown in Figure 19.10.
In Table 19.1, it clearly observed that nearly 98% of accuracy, approximately 64% of
sensitivity, and nearly 62% of specificity are obtained for all the patients. The param-
eters of all the patients are shown in Figure 19.11.
286 Computational Intelligence in Biomedical and Health Informatics
TABLE 19.1
Statistical Parameters of Four Patients
Patient Details Patient 1 (P-1) Patient 2 (P-2) Patient 3 (P-3) Patient 4 (P-4)
REFERENCES
Abdeldjouad, F., Brahami, M., & Matta, N. (2020). A Hybrid Approach for Heart Disease
Diagnosis and Prediction Using Machine Learning Techniques. In The Impact of Digi‑
tal Technologies on Public Health in Developed and Developing Countries, 18th Inter‑
national Conference, ICOST 2020, Proceedings, Hammamet, Tunisia, June 24–26.
PMCID: PMC7313286.
Alom, M.Z., Taha, T.M., Yakopcic, C., Westberg, S., Sidike, P., Nasrin, M.S., Hasan, M., Van
Essen, B.C., Awwal, A.A., & Asari, V.K. (2019). A State-of-the-Art Survey on Deep
Learning Theory and Architectures. Electronics, 8(3), 292.
290 Computational Intelligence in Biomedical and Health Informatics
Amrit, C., Paauw, T., Aly, R., & Lavric, M. (2017). Identifying Child Abuse Through Text
Mining and Machine Learning. Expert Systems with Applications, 88, 402–418.
Andreao, R.V., Dorizzi, B., & Boudy, J. (2006). ECG Signal Analysis through Hidden Markov
Models. IEEE Transactions on Biomedical Engineering, 53(8), 1541–1549.
Bhambri, P., & Bhandari, A. (2005, March). Different Protocols for Wireless Security. In Paper
Presented at the National Conference on Advancements in Modeling and Simulation, 8.
Bhambri, P., Gupta, S., & Bhandari, A. (2005b, March). Soft Computing Techniques. In Paper
Presented at the National Conference on Emerging Computing Technologies, 35–41.
Bhambri, P., & Mangat, A.S. (2005, March). Wireless Security. In Paper Presented at the
National Conference on Emerging Computing Technologies, 155–161.
Bhambri, P., & Singh, I. (2005, March). Electrical Actuation Systems. In Paper Presented at
the National Conference on Application of Mathematics in Engineering & Technology,
58–60.
Bhambri, P., Singh, I., & Gupta, S. (2005a, March). Robotics Systems. In Paper Presented at
the National Conference on Emerging Computing Technologies, 27.
Fryar, C.D., Chen, T.C., & Li, X. (2012). Prevalence of Uncontrolled Risk Factors for Car‑
diovascular Disease: United States, 1999–2010; Number 103. Atlanta, GA, USA: US
Department of Health and Human Services, Centers for Disease Control and Prevention,
pp. 1–8.
Karimullah, S., Vishnu Vardhan, D., & Basha, S.J. (2020). Floorplanning for Placement of
Modules in VLSI Physical Design Using Harmony Search Technique. In ICDSMLA
2019. Lecture Notes in Electrical Engineering, vol. 601. Singapore: Springer. https://
doi.org/10.1007/978-981-15-1420-3_197.
Karimullah, S., Vishnuvardhan, D., & Bhaskar, V. (2022). An Improved Harmony Search
Approach for Block Placement for VLSI Design Automation. Wireless Personal Com‑
munications, 127(6), 3041–3059. https://doi.org/10.1007/s11277-022-09909-2.
Kaur, D., Singh, B., & Rani, S. (2023). Cyber Security in the Metaverse. In Handbook of Research
on AI-Based Technologies and Applications in the Era of the Metaverse (pp. 418–435).
Hershey, PA: IGI Global.
Liu, T., et al. (2021). Detection of Coronary Artery Disease Using Multi-Domain Feature
Fusion of Multi-Channel Heart Sound Signals. Entropy (Basel, Switzerland), 23(6), 642.
doi: 10.3390/e23060642.
Mitra, M., & Samanta, R. (2013). Cardiac arrhythmia classification using neural networks with
selected features. Procedia Technology, 10, 76–84.
Murray, C.J., & Lopez, A.D. (1994). Global Comparative Assessments in the Health Sec‑
tor: Disease Burden, Expenditures, and Intervention Packages. Geneva: World Health
Organization.
Nourmohammadi-Khiarak, J., Feizi-Derakhshi, M.R., Behrouzi, K., et al. (2020). New Hybrid
Method for Heart Disease Diagnosis Utilizing Optimization Algorithm in Feature Selec-
tion. Health and Technology, 10, 667–678. https://doi.org/10.1007/s12553-019-00396-3.
Oh, M.S., & Jeong, M.H. (2020). Sex Differences in Cardiovascular Disease Risk Factors
Among Korean Adults. The Korean Journal of Medicine, 95, 266–275.
Park, K., Cho, B., Lee, D., Song, S., Lee, J., Chee, Y., et al. (2008). Hierarchical Support Vector
Machine based Heartbeat Classification using Higher Order Statistics and Hermite Basis
Function. In 2008 Computers in Cardiology (pp. 229–232). Bologna, Italy: IEEE.
Pathak, A., Samanta, P., Mandana, K., & Saha, G. (2020). An Improved Method to Detect Cor-
onary Artery Disease Using Phonocardiogram Signals in Noisy Environment. Applied
Acoustics, 164, 107242. https://doi.org/10.1016/j.apacoust.2020.107242.
Pouyanfar, S., Sadiq, S., Yan, Y., Tian, H., Tao, Y., Reyes, M.P., Shyu, M.L., Chen, S.C., &
Iyengar, S. (2018). A Survey on Deep Learning: Algorithms, Techniques, and Applica-
tions. ACM Computing Surveys (CSUR), 51(5), 1–36.
Blockchain-Enhanced Convolutional Neural Networks 291
Puri, V., Kataria, A., Rani, S., & Pareek, P. K. (2023, September). DLT Based Smart Medical
Ecosystem. In 2023 International Conference on Network, Multimedia and Information
Technology (NMITCON) (pp. 1–6). Bengaluru, India: IEEE.
Rani, S., Kataria, A., Kumar, S., & Tiwari, P. (2023). Federated Learning for Secure IoMT-
Applications in Smart Healthcare Systems: A Comprehensive Review. Knowl‑
edge-Based Systems, 110658.
Rani, S., Kumar, S., Kataria, A., & Min, H. (2023). SmartHealth: An Intelligent Framework to
Secure IoMT Service Applications Using Machine Learning. ICT Express. https://doi.
org/10.1016/j.icte.2023.10.001.
Rani, S., Mishra, A. K., Kataria, A., Mallik, S., & Qin, H. (2023). Machine Learning-Based
Optimal Crop Selection System in Smart Agriculture. Scientific Reports, 13(1), 15997.
Ribeiro, A.H., Ribeiro, M.H., Paixao, G.M., Oliveira, D.M., Gomes, P.R., Canazart, J.A., et al.
(2020). Automatic Diagnosis of the 12-lead ECG Using a Deep Neural Network. Nature
Communications, 11(1), 1–9.
Rozenwald, M.B., Galitsyna, A.A., Sapunov, G.V., Khrameeva, E.E., & Gelfand, M.S. (2020).
A Machine Learning Framework for the Prediction of Chromatin Folding in Drosophila
Using Epigenetic Features. Peer J Computer Science, 6, 307.
Savalia, S., & Emamian, V. (2018). Cardiac Arrhythmia Classification by Multi-Layer Percep-
tron and Convolution Neural Networks. Bioengineering, 5, 35.
Shaik, F., Sharma, A. K., & Ahmed, S. M. (2016). Hybrid Model for Analysis of Abnormalities
in Diabetic Cardiomyopathy and Diabetic Retinopathy Related Images. Springer Plus,
5, 507.
Shaik, K., Javeed, S., Guruvyshnavi, P., Reddy, K., & Navyatha, B. (2021). A Genetic
Algorithm with Fixed Open Approach for Placements and Routings. https://doi.
org/10.1007/978-981-15-7961-5_58.
Shaik, K., Sai Sumanth Goud, E., & Lava Kumar Reddy, K. (2023). Spectral Efficiency
for Multi-bit and Blind Medium Estimation of DCO-OFDM Used Vehicular Visible
Light Communication. In A. Kumar, S. Senatore, V.K. Gunjan (eds) ICDSMLA 2021.
Lecture Notes in Electrical Engineering, vol. 947. Singapore: Springer. https://doi.
org/10.1007/978-981-19-5936-3_83.
Tang, X., & Shu, L. (2014). Classification of Electrocardiogram Signals with RS and Quantum
Neural Networks. International Journal of Multimedia and Ubiquitous Engineering, 9,
363–372.
Tarawneh, M., & Embarak, O. (2019). Hybrid Approach for Heart Disease Prediction Using
Data Mining Techniques. In Advances in Internet, Data and Web Technologies, EIDWT
2019. Lecture Notes on Data Engineering and Communications Technologies, vol. 29.
Cham: Springer. https://doi.org/10.1007/978-3-030-12839-5_41.
Trevisan, C., Sergi, G., & Maggi, S. (2020). Gender Differences in Brain-Heart Connection.
Brain and Heart Dynamics, 937–951.
Vijayavanan, M., Rathikarani, V., & Dhanalakshmi, P. (2014). Automatic Classification of
ECG Signal for Heart Disease Diagnosis using Morphological Features. International
Journal of Computer Science Engineering Technology, 5(4), 449–455.
20 Research Landscape
of Blockchain and
Computational
Intelligence in
Healthcare and
Biomedical Fields
A Bibliometric Analysis
Parul Dubey, Amit Srivastava, Priti Nilesh Bhagat,
and Pushkar Dubey
20.1 INTRODUCTION
Healthcare and biological sciences are being transformed by emerging technology.
These technologies, including blockchain and computational intelligence, might alter
research, data management, and decision-making. Blockchain technology makes data
collecting and sharing safe and transparent, while machine learning and artificial intel-
ligence provide quick data analysis and decision support. These technologies together
solve long-standing healthcare and biological research issues Kaur et al. (2023).
A bibliometric study is needed to understand blockchain and computational intel-
ligence in healthcare and biological research. Quantitative bibliometrics may exam-
ine academic subject publishing, citation, and collaboration trends (Donthu et al.,
2021). This study analyses Web of Science publications and uses VOSviewer to pro-
vide a systematic and comprehensive review of blockchain and computational intel-
ligence research in healthcare and biomedical fields.
This study contains a wide range of works from 1990 to the present, tracing this
topic’s growth. The selected time frame ensures a complete evaluation of current
knowledge, including recent advances and trends. The Web of Science database pro-
vides a reliable source of scientific papers for bibliometric analysis.
The objectives of this study are to:
Identify and map significant research subjects and subdomains in healthcare and
biomedical research involving blockchain and computational intelligence.
20.3 METHODOLOGY
The methodology section of this research encompasses various stages of data collec-
tion, extraction, preprocessing, and bibliometric analysis. Figure 20.1 shows steps in
the methodology in detail. The following sections provide an overview of each step
involved.
294 Computational Intelligence in Biomedical and Health Informatics
Data Source and Collection: The primary data source for this research is
the Web of Science database, which is a comprehensive collection of schol-
arly publications across multiple disciplines. Relevant keywords related
to blockchain, computational intelligence, healthcare, and biomedical
research were used to search The Web of Science database, which contains
scientific papers from many fields and is the main data source for this
study. Searching for papers will employ blockchain, computational intelli-
gence, healthcare, and biomedical research keywords (Singh et al., 2005d).
To capture the newest field advancements, data was collected from 1900
to July 2023 for publications. The chosen timeframe for data collection is
from 1900 to the present (July 2023) to capture the latest developments in
the field.
Data Extraction and Preprocessing: After identifying relevant papers,
Web of Science data was extracted. Reference management software like
EndNote or Zotero was used to organize and handle the extracted data.
Duplicate records were deleted for a clean analytical dataset.
Publication Trends: Publication trends were analyzed to gain insights into
the growth and evolution of research in the field. The number of publica-
tions over time were examined to identify increasing or decreasing interest
in the topic.
Research of Blockchain and Computational Intelligence 295
20.6 PUBLICATION TRENDS
The publication trends in blockchain and computational intelligence in healthcare
and biomedical research have grown significantly. The data shows a slow start in the
late 1990s and early 2000s, with few publications. Since 2007, the number of articles
has increased, indicating increased interest in the topic.
Publishing increased steadily, with a major increase from 2017. With 155 arti-
cles in 2018, the tendency continued to accelerate. Publications increased more than
twice to 333 in 2019. The growth pattern accelerated in 2020 with 469 publications.
Publications peaked at 586 in 2021. This shows that blockchain and computational
intelligence are becoming more important in healthcare and biomedical research.
The number of publications nearly doubled in 2022 to 873. The partial 2023 data
shows 325 publications, indicating ongoing activity.
The publishing trends show a constant increase in blockchain and computational
intelligence research in healthcare and biomedical research. The rising number of
studies shows that these technologies can transform healthcare and biomedical proce-
dures. The increased trajectory in publication counts shown in Figure 20.4 reflects a
robust and expanding research ecosystem, underscoring the importance of blockchain
and computational intelligence in addressing difficulties and fostering innovation.
20.7 CO-AUTHORSHIP ANALYSIS
Bibliometric analysis identifies notable authors, nations, and organizations in block-
chain and computational intelligence in healthcare and biomedical research using
co-authorship analysis.
India: Cluster 3’s India is a major contributor. The country has 418 co-
authorship links. This shows active Indian research cooperation. The nation
has released 652 documents, demonstrating its research output. Indian
research in this topic has 8414 citations, demonstrating its impact.
Research of Blockchain and Computational Intelligence 299
King Saud University: Cluster 2’s King Saud University has 12 co-
authorships. The organization has released 38 documents, indicating exten-
sive investigation.
Nirma University: Cluster 4’s Nirma University has 31 co-authorship relation-
ships with 37 publications. The organization has produced notable research.
King Abdulaziz University: This university in cluster 3 has 22 co-authorship
relationships. The organization issued 36 documents, demonstrating its sci-
entific output.
Taif University: Cluster 4’s Taif University has a co-authorship connection
strength of 1. The 31 documents published by Taif University show signif-
icant research.
Vellore Institute of Technology: Vellore Institute of Technology, cluster 1,
has 5 co-authorship relationships. The organization has 31 publications
exhibiting its research.
These findings show how blockchain and computational intelligence firms collab-
orate in healthcare and biomedical research. King Saud University, Nirma University,
King Abdulaziz University, Taif University, and Vellore Institute of Technology con-
tribute to this subject through research and cooperation.
Co-authorship examination by authors, countries, and organizations reveals
field-wide collaborations. Key contributions, geographic trends, and institutional
20.8 CO-OCCURRENCE ANALYSIS
Based on co-occurrence analysis of all keywords with a minimum incidence of 60,
51 of 6602 keywords satisfied the criterion. “blockchain,” “security,” “internet,”
“privacy,” “healthcare,” “IOT (Internet of Things),” “challenges,” “framework,” and
“artificial intelligence” are the top ten keywords in blockchain and computational
intelligence in healthcare and biomedical research, which are centered on these
terms. High recurrence denotes literature importance and renown.
The most common keyword is “blockchain,” suggesting its significant position in
the area. Other common keywords include “security” and “privacy,” emphasizing the
need for safe and private blockchain transactions and data management. “Healthcare”
and “IoT” keywords show how blockchain and computational intelligence are used
in healthcare to integrate medical devices and data. All keyword co-occurrences are
shown in Figure 20.8.
The phrases “hurdles” and “framework” emphasize the challenges and necessity
for structured ways in implementing and using blockchain and computational intel-
ligence in healthcare and biomedical research. The term “artificial intelligence” also
refers to computational intelligence and AI techniques in the field.
This analysis illuminates the main themes and concepts in blockchain and com-
putational intelligence in healthcare and biomedical research. These keywords indi-
cate the major areas of attention, research problems, and emerging trends in the
discipline, helping scholars and practitioners navigate this quickly expanding sector.
20.9 CITATION ANALYSIS
Based on the citation analysis, with a minimum of 200 citations per document, a sub-
set of 33 documents out of the total 2894 documents met the criteria. Among these
documents, 26 were found to be connected in citation clusters. Table 20.1 shows the
details of the top ten documents in this criterion.
20.10 BIBLIOGRAPHIC COUPLING
Bibliographic coupling analysis discovered 13 of 1285 sources with at least 20 docu-
ments and 50 citations. Figure 20.9 displays the source network.
Bibliographic coupling study links sources using shared citations. This technique
helps us find clusters of linked sources and understand field relationships and study
themes.
We can better comprehend influential blockchain and computational intelligence
works and research trends in healthcare and biomedical research by identifying
sources that fulfill the requirements. The selected subset of 13 sources provides
excellent insights into key publications and influential research contributions that
have been widely cited by other academics in the field.
TABLE 20.1
Top Ten Most Cited Documents
Si. No. Author and Year Cluster Weight<Links> Weight<Citations>
20.12 CONCLUSION
This chapter utilized bibliometric analysis to investigate the field of blockchain and
computational intelligence in healthcare and biomedical research. The study ana-
lyzed publishing trends, collaborations, research themes, and important sources. The
findings showed a considerable increase in research output, author collaboration,
keyword co-occurrence analysis of pertinent research subjects, and highly cited and
influential sources. This research helps researchers, practitioners, and policymakers
understand the current state of blockchain and computational intelligence in health-
care and biomedical research and can guide future advances. It covers the benefits
and drawbacks of blockchain and computational intelligence in healthcare.
REFERENCES
Agbo, C., Mahmoud, Q., & Eklund, J. (2019, April 4). Blockchain Technology in Healthcare:
A Systematic Review. Healthcare, 7(2), 56. https://doi.org/10.3390/healthcare7020056.
Azaria, A., Ekblaw, A., Vieira, T., & Lippman, A. (2016, August). MedRec: Using Blockchain
for Medical Data Access and Permission Management. In 2016 2nd International Con‑
ference on Open and Big Data (OBD). https://doi.org/10.1109/obd.2016.11.
Casino, F., Dasaklis, T. K., & Patsakis, C. (2019, March). A Systematic Literature Review of
Blockchain-Based Applications: Current Status, Classification and Open Issues. Telem‑
atics and Informatics, 36, 55–81. https://doi.org/10.1016/j.tele.2018.11.006
Dagher, G. G., Mohler, J., Milojkovic, M., & Marella, P. B. (2018, May). Ancile: Privacy-
Preserving Framework for Access Control and Interoperability of Electronic Health
Records Using Blockchain Technology. Sustainable Cities and Society, 39, 283–297.
https://doi.org/10.1016/j.scs.2018.02.014.
Donthu, N., Kumar, S., Mukherjee, D., Pandey, N., & Lim, W. M. (2021, September). How
to Conduct a Bibliometric Analysis: An Overview and Guidelines. Journal of Business
Research, 133, 285–296. https://doi.org/10.1016/j.jbusres.2021.04.070.
Dutta, P., Choi, T. M., Somani, S., & Butala, R. (2020, October). Blockchain Technology in
Supply Chain Operations: Applications, Challenges and Research Opportunities. Trans‑
portation Research Part E: Logistics and Transportation Review, 142, 102067. https://
doi.org/10.1016/j.tre.2020.102067.
Dwivedi, A., Srivastava, G., Dhar, S., & Singh, R. (2019, January 15). A Decentralized
Privacy-Preserving Healthcare Blockchain for IoT. Sensors, 19(2), 326. https://doi.
org/10.3390/s19020326.
Griggs, K. N., Ossipova, O., Kohlios, C. P., Baccarini, A. N., Howson, E. A., & Hayajneh,
T. (2018, June 6). Healthcare Blockchain System Using Smart Contracts for Secure
Automated Remote Patient Monitoring. Journal of Medical Systems, 42(7). https://doi.
org/10.1007/s10916-018-0982-x.
306 Computational Intelligence in Biomedical and Health Informatics
Kataria, A., Puri, V., Pareek, P. K., & Rani, S. (2023, July). Human Activity Classification
Using G-XGB. In 2023 International Conference on Data Science and Network Security
(ICDSNS) (pp. 1–5). IEEE.
Kaur, D., Singh, B., & Rani, S. (2023). Cyber Security in the Metaverse. In Handbook of Research
on AI-Based Technologies and Applications in the Era of the Metaverse (pp. 418–435).
IGI Global.
Kouhizadeh, M., Saberi, S., & Sarkis, J. (2021, January). Blockchain Technology and the Sus��-
tainable Supply Chain: Theoretically Exploring Adoption Barriers. International Jour‑
nal of Production Economics, 231, 107831. https://doi.org/10.1016/j.ijpe.2020.107831.
Kuo, T. T., Kim, H. E., & Ohno-Machado, L. (2017, September 8). Blockchain Distributed
Ledger Technologies for Biomedical and Health Care Applications. Journal of the Amer‑
ican Medical Informatics Association, 24(6), 1211–1220. https://doi.org/10.1093/jamia/
ocx068.
Moral-Muñoz, J. A., Herrera-Viedma, E., Santisteban-Espejo, A., & Cobo, M. J. (2020,
January 19). Software Tools for Conducting Bibliometric Analysis in Science: An
Up-to-Date Review. El Profesional De La Información, 29(1). https://doi.org/10.3145/
epi.2020.ene.03.
Puri, V., Kataria, A., Rani, S., & Pareek, P. K. (2023, September). DLT Based Smart Medical
Ecosystem. In 2023 International Conference on Network, Multimedia and Information
Technology (NMITCON) (pp. 1–6). IEEE.
Rani, S., Kataria, A., Kumar, S., & Tiwari, P. (2023). Federated Learning for Secure IoMT-
Applications in Smart Healthcare Systems: A Comprehensive Review. Knowl‑
edge-Based Systems, 110658.
Rani, S., Kumar, S., Kataria, A., & Min, H. (2023). SmartHealth: An Intelligent Framework to
Secure IoMT Service Applications Using Machine Learning. ICT Express. https://doi.
org/10.1016/j.icte.2023.10.001.
Rani, S., Mishra, A. K., Kataria, A., Mallik, S., & Qin, H. (2023). Machine Learning-Based
Optimal Crop Selection System in Smart Agriculture. Scientific Reports, 13(1), 15997.
Singh, M., Bhambri, P., & Kaur, K. (2005a, March). Network Security. In Paper presented at
the National Conference on Future Trends in Information Technology, 51–56.
Singh, M., Singh, P., Bhambri, P., & Sachdeva, R. (2005b). A Comparative Study: Secu-
rity Algorithms. In U.G.C. Sponsored National Seminar (Abstract Book Page No. 26)
on “Network Security and Its Implementations” (p. 14), Doaba College, Jalandhar, 1
March 2005.
Singh, M., Singh, P., Kaur, K., & Bhambri, P. (2005c, March). Database Security. In Paper pre‑
sented at the National Conference on Future Trends in Information Technology, 57–62.
Singh, P., Singh, M., & Bhambri, P. (2005d, March). Internet Security. In Paper presented at
the Seminar on Network Security and Its Implementations, 22.
Singh, P., Singh, M., & Bhambri, P. (2005e, March). Security in Virtual Private Networks. In
Seminar on Network Security and Its Implementations, 11.
Subject and Course Guides: Bibliometric Analysis and Visualization: Bibliometrics with
VOSViewer. (2023, June 21). Bibliometrics with VOSViewer—Bibliometric Analysis
and Visualization—Subject and Course Guides at University of Illinois at Chicago.
https://researchguides.uic.edu/bibliometrics/vosviewer.
VOSviewer—Visualizing scientific landscapes. (n.d.). VOSviewer. www.vosviewer.com.
Yue, X., Wang, H., Jin, D., Li, M., & Jiang, W. (2016, August 26). Healthcare Data Gateways:
Found Healthcare Intelligence on Blockchain with Novel Privacy Risk Control. Journal
of Medical Systems, 40(10). https://doi.org/10.1007/s10916-016-0574-6.
21 Bone Marrow Cancer
Detection From
Leukocytes using
Neural Networks
Sundari M. Shanmuga and Pankaj Bhambri
21.1 INTRODUCTION
This chapter describes bone marrow cancer detection using convolution neural
networks. The illustration in Figure 21.1 depicts the sponge-like substance located
within bones, known as marrow. Stem cells reside in the innermost part of the bone,
possessing the ability to differentiate into white blood cells (WBCs), red blood cells
(RBCs), or platelets. Hematopoietic cells are constantly produced in the bone mar-
row and are systematically discharged into the bloodstream at regular intervals.
Cancer is a life-threatening condition, and early detection is the most effective
approach to its treatment. Medical image processing plays a vital role in diagnosing
illnesses. Leukemia, a type of malignancy arising from abnormal or immature white
blood cells (WBCs) [1], is a condition in which these cells, responsible for combating
infectious agents in the human body, become aberrant. The abnormal proliferation of
WBCs from the bone marrow affects both bone marrow and lymphatic tissues, lead-
ing to the destruction of other cells. Leukemia results from improper cell function
when marrow cells grow excessively or rapidly. This abnormal growth can lead to
bone marrow cancer, also known as blood cancer, which is distinct from bone cancer.
Acute lymphocytic leukemia (ALL) is a cancer of the bone marrow and blood
that influences white blood cells [2]. Acute disease progresses quickly, and if it is
not treated in the first stages, it could quickly become fatal. ALL, a blood and bone
marrow cancer with a rapid growth rate, is characterized by the proliferation of many
immature lymphocytes, or lymphoblasts.
Leukemia, a range of blood malignancies, generates an abundance of abnormal
blood cells and commonly originates in the bone marrow. The diagnosis of blood
disorders involves differentiating leukemia cells from healthy white blood cells. Over
time, manual techniques can identify, categorize, and count blood cells [3], but they
are expensive, labor-intensive, sluggish, and prone to error.
When we need to analyze a bulk of pictures, deep learning comes into the frame
because it works more efficiently than standard machine learning. Convolution
neural networks blend multilayer perceptrons, along with a cleaning, to manifest
productive outcomes. As every convolutional layer of the network retains the latest
attribute in the pictures and outcomes in greater activation, CNNs acts as an attribute
extractor. This project aims to develop an automated classifier using neural networks
to determine whether an individual is diagnosed with cancer or not.
In response to these challenges, an automated system has been implemented,
leveraging microscopic image detection. This automated approach offers a swift,
cost-effective, and highly accurate alternative, eliminating the dependency on spe-
cialized laboratory equipment [4].
Deep learning, renowned for its superior performance in processing vast image
datasets, excels with different algorithms. Convolutional neural networks, a subset
of deep learning, amalgamate various multilayer perceptrons, delivering efficient
results with minimal preprocessing. The inherent capability of CNNs to act as fea-
ture extractors further enhances their effectiveness. Each convolutional layer within
the network learns distinct features present in the images, contributing to high acti-
vation levels.
The overarching goal of this project is to develop an automated classifier using
neural networks. Specifically, the objective is to ascertain whether an individual is
diagnosed with cancer or not. The project seeks to transform the diagnostic process
by utilizing deep learning, specifically CNNs, to automate the examination of micro-
scopic pictures. This approach intends to provide a more efficient and precise method
for recognizing malignant situations.
21.2 LITERATURE SURVEY
Deepika Kumari explains two types of leukemia: ALL and MM. The bone mar-
row generates a larger number of lymphocytes in leukemia (ALL). They accumulate
in the bone marrow as a result of a different type of malignancy called multiple
myeloma (MM) [5].
Afshan Shah describes leukemia as the fast creation of abnormal white blood
cells. It will harm our body’s bone marrow and have an impact on the blood [6].
We can even detect those by manual methods as well. Because manual procedures
take a long time, automated approaches employing CAD have been developed to
solve the issues. Tanveer Hussain explains that the deep learning (DL) and classic
Marrow Cancer Detection From Leukocytes using Neural Networks 309
machine learning (TML) methods have significantly improved medical picture anal-
ysis (MIA) [7]. These techniques significantly enhance the automatic diagnosis of
brain tumors and leukemia/blood cancers and can help hematologists.
Rune Wetteland states that urothelial carcinoma, the most common form of blad-
der cancer, has a high rate of recurrence and requires continuous therapy for the
rest of a person’s life [8, 9]. Tusneem Ahmed states that AML treatments have been
a laborious procedure, that is, susceptible to human error [10, 11]. Nadeem Akram
explains that one of the most fatal forms of blood cancer is leukemia. The diagnosis
of leukemia is significantly correlated with white blood cells (WBCs) [12].
Bowen Zhang explains that liquid biopsy, a quick and noninvasive method of can-
cer screening, is becoming more significant. The H2O framework method was used
in this study to incorporate a range of blood biochemical parameters and create a
recognition structure [13].
Maryam Basji explains that technologies for early cancer diagnosis [14, 15] can
offer useful data and possibly lower the death rate brought on by cervical cancer.
Previous research has developed a miniature ultrasound and photoacoustic endo-
scopic instrument for examining cervical tissue through the cervix [16, 17]. A dual-
mode illumination system may deliver more accurate information.
MD Tauhidul Islam explains that the diagnosis, prognosis, and treatment of can-
cer, interstitial fluid pressure, velocity, and associated measures have significant clin-
ical value. We demonstrated the correlation between these approximated values and
the underlying intrinsic factor of proliferation (IFP), intrinsic factor of vasculariza-
tion (IFV), fluid flow, and supplementary components within the tumors [18].
Shajoong Wang explains that the fecal occult blood test (FOBT), used for the reg-
ular detection of bowel cancer, as well as the high cost and discomfort of microscopy,
are some of the limiting factors for this disease, which is easily influenced by food
and medication [19, 20].
Peng Li explains that tumor development and autonomic function play a signifi-
cant role. Lower heart rate variability has been associated with greater levels of the
C-reactive protein (CRP), which is found in the blood (HRV), a standard clinical
test for evaluating autonomic function, according to earlier research [21, 22]. Ajith
Abraham provides a concise explanation that leukemia is a hematological disorder
that specifically impacts white blood cells and originates in the WBCs [23, 24].
Tanveer Hussain says that methods have significantly improved medical picture
analysis (MIA) [25, 26]. These techniques have significantly enhanced the automatic
diagnosis of brain tumors and leukemia/blood cancers and can help hematologists.
This study provides a comprehensive examination of different machine learning
(ML) and deep learning (DL) algorithms for medical image analysis (MIA), specif-
ically focusing on the categorization of leukocytes in blood smear images and other
medical imaging domains such as magnetic resonance imaging (MRI), CT images,
X-rays, and ultrasounds. These techniques will significantly enhance future develop-
ments in speech analysis, natural language processing, and medical imaging.
Leukemia, as described by Ajith Abraham, is a hematological disorder that spe-
cifically impacts white blood cells and starts within the bone marrow. The preferred
approach for early detection of leukemia is the microscopic examination of WBCs
due to its minimal invasiveness and cost-effectiveness. In this study, various AI-based
310 Computational Intelligence in Biomedical and Health Informatics
TABLE 21.1
Summary of Literature Survey
S. No. Ref. Number Description/Interpretation
1 [1] It aims to predict the kind of cancer the cells have (ALL).
Future work: This is implemented on a smaller dataset
2 [2] This paper thoroughly examines the CAD methods used to identify
different types of leukemia.
Future work: To suggest improved preprocessing and segmentation
techniques that better handle noisy, high-density images and effectively
segment blast cells.
3 [5] This paper enhanced automatic brain tumor and leukemia/blood cancer
detection diagnoses.
Future work: To learn more about the intricate nuances of TML and DL.
4 [7] The TRIgrade pipeline is introduced in this study as a method to identify
diagnostically significant regions within a whole-slide image (WSI) and
predict the overall grade of the WSI.
Future work: The tissue segmentation model will undergo an upgrade to
incorporate a new category for blur, hence enhancing its versatility.
Additionally, preprocessing techniques will be implemented to address
variations in color and blur.
5 [10] A novel hybrid feature extraction method was created in this study.
Future work: Hybridization and parallelization techniques could further
enhance the suggested model.
6 [12] Methods for manually assessing WBC are time-consuming, subjective,
and less precise.
Future work: Work on cell segmentation between nearby ones. For
computer-assisted diagnosis, we will also take into account various
cancer kinds.
approaches for detecting ALL are thoroughly assessed in terms of their advantages
and disadvantages. Further research is required to precisely classify benign and
malignant forms of acute lymphoblastic leukemia (ALL), as well as its L1, L2, and
L3 subtypes. This will result in more accurate diagnoses of the disease. The overall
literature survey is represented as a tabular format in Table 21.1.
21.3 PROPOSED SYSTEM
21.3.1 Architecture
The proposed model’s architecture, as in Figure 21.2, can be broken down into eight
phases or eight steps. As shown in the figure, first the C-NMC 2019 dataset was taken
from Kaggle [27]. A total of 10,661 images totaling 627 MB in size were produced
using microscopic photographs that were segmented to show white blood cells. There
are labels on these photographs indicating whether they are malignant or normal.
Marrow Cancer Detection From Leukocytes using Neural Networks 311
FIGURE 21.2 Architecture design of bone marrow cancer detection using neural networks.
Data from 49 healthy volunteers and 69 cancer patients was used to collect images,
which were then separated into learning, evaluating, and testing. The training set
would receive 60% of the total amount of data, followed by the validation set at 20%
and the test set at 20%.
21.3.2 Algorithm ResNet50
The ResNet50 convolutional neural network, as described in reference [28], com-
prises a total of 50 layers. The ResNet50 architecture follows two essential design
principles. First, irrespective of the output feature map’s dimensions, every layer
incorporates an equal number of filters. Second, to maintain the time complexity of
each layer, the feature map doubles its number of filters when its size is halved.
In Figure 21.3 the ResNet50 architecture accommodates the following concepts:
Activation operations and max/average layer pooling are not considered. After
assembling all the layers, the 50-layer-deep convolutional network consists of 1 + 9 +
12 + 18 + 9 + 1 layers.
21.3.3 Algorithm MobileNetV2
One AvgPool and 53 convolution layers make up the MobileNet V2 model. There are
two key parts to it:
Stride 1 Block: Stride 1 block has 5 layers. It starts with the input layer fol-
lowed by the 1×1 convolution with Relu6. The third layer is the depth-wise
convolution with Relu6 followed by the 1×1 convolution without any linear-
ity. The last layer is the added layer.
Stride 2 Block: Stride 2 block consists of 4 layers. The input layer is the initial
layer, which is subsequently followed by a 1×1 convolution operation with
the Rectified Linear Unit 6 (Relu6) activation function. The third layer is the
depth-wise convolution where the stride is equal to 2 (stride = 2) and Relu6,
and the last layer is the 1×1 convolution without any linearity.
Stride 1 Block
Input: The initial step involves taking the input feature map.
1×1 Convolution with Relu6: The input is subjected to a 1×1 convolutional
layer, which is then followed by the activation function known as Rectified
Linear Unit 6 (Relu6). The 1×1 convolution is responsible for linear trans-
formations on the input, and Relu6 introduces nonlinearity while ensuring
the output remains within the range [0, 6].
Depthwise Convolution with Relu6: This is a depthwise separable convolu-
tion operation. It involves applying a separate convolutional operation for
each channel of the input. The depthwise convolution is followed by the
Relu6 activation function, introducing nonlinearity to capture complex pat-
terns [29, 30].
1×1 Convolution without Any Linearity: Another 1×1 convolutional layer is
applied to the result of the depthwise convolution. Importantly, there is no
subsequent activation function, implying that this layer contributes linear
transformations without introducing nonlinearity [31, 32].
Add: The output of the previous step is added to the original input. This skip
connection facilitates the flow of gradient during training, aiding in the con-
vergence of the model.
Stride 2 Block
Input: Similar to the Stride 1 Block, the process starts with the input feature
map.
1×1 Convolution with Relu6: A 1×1 convolutional layer is applied with the
Relu6 activation function.
Depthwise Convolution with Stride=2 and Relu6: The depthwise separable
convolution is performed with a stride of 2, which means the convolutional
Marrow Cancer Detection From Leukocytes using Neural Networks 315
21.4 RESULT
The dataset utilized in this work undergoes a sequence of preprocessing approaches
to augment the quality and pertinence of the photographs. The first measures are
essential to guarantee that the subsequent stages of model training and testing pro-
duce significant and precise outcomes. The proposed algorithms, implemented with
ResNet50 and MobileNetV2 models, are instrumental in predicting cancerous cells
from the processed images. Figure 21.6 presents the receiver operating characteristic
FIGURE 21.6 Evaluation metric-confusion matrix and ROC curve of ResNet50 and
MobileNetV2.
316 Computational Intelligence in Biomedical and Health Informatics
(ROC) curves and confusion matrices, which visually depict the classification capa-
bilities of the models, providing a thorough evaluation of their performance.
The evaluation of model precision is further elaborated in Table 21.2, where
accuracies derived from the F1 Score are displayed. The F1 Score, which takes into
account both precision and recall, offers a well-balanced evaluation of a model’s per-
formance. The findings collected demonstrate that ResNet50 surpasses MobileNetV2
in terms of accuracy, confirming the efficacy of the suggested approach for cancer
prediction. The superior accuracy attained by ResNet50 highlights its resilience and
appropriateness for the particular job of distinguishing malignant cells within the
dataset.
These findings carry significant implications for medical applications, particu-
larly in the early detection of bone marrow cancer. The superiority of ResNet50 in
accuracy suggests its potential as a reliable tool for medical professionals in predict-
ing and diagnosing cancer at an early stage. As such, the proposed method, anchored
by ResNet50, showcases promise in contributing to advancements in medical imag-
ing and diagnostic practices, ultimately fostering improved outcomes for patients
through timely and accurate interventions.
Table 21.2 explains the accuracy of the ResNet50 and MobileNetV2. ResNet gives
more accuracy than MobileNet.
The results obtained from the experimentation and evaluation process unequiv-
ocally demonstrate that ResNet50 exhibits a superior level of accuracy compared to
MobileNetV2. This disparity in accuracy metrics serves as a pivotal insight into the
effectiveness of the proposed method for predicting cancer, specifically within the
context of bone marrow cells. The higher accuracy achieved by ResNet50 under-
scores its ability to more precisely discriminate between cancerous and normal cells
in the given dataset.
Accuracy, a crucial measure in evaluating the performance of machine learning
models, indicates the algorithms’ capacity to generate accurate predictions. In the
case of cancer prediction, where precision is of utmost importance, the higher accu-
racy of ResNet50 suggests its proficiency in accurately identifying malignant cells.
This outcome has profound implications for the potential clinical applications of the
proposed method, especially in the early diagnosis of bone marrow cancer.
The preference for ResNet50 over MobileNetV2 in terms of accuracy implies that
the former is better suited for the task at hand. This finding is significant not only
for the current study but also for broader applications in medical diagnostics. The
robust performance of ResNet50 positions it as a valuable tool for healthcare profes-
sionals, providing a reliable means for early cancer detection.
TABLE 21.2
Comparison Table
S. No Algorithms Accuracy (%)
1. ResNet50 94.23
2. MobileNetV2 87.06
Marrow Cancer Detection From Leukocytes using Neural Networks 317
21.5 CONCLUSION
The anticipation of cell presence stands as a pivotal advancement in the identification
of bone marrow cancer, streamlining the diagnostic process. Rigorous testing, val-
idation, and training of models using datasets contribute to the efficacy of this pre-
dictive approach. Leveraging state-of-the-art technologies, particularly the ResNet50
and MobileNetV2 models, facilitates accurate predictions of cancerous cells from
images. These computer-aided systems play a crucial role in enabling early detection
of bone marrow cancer, a key factor in expediting recovery and improving patient
outcomes.
In the comparative evaluation of the models, ResNet50 emerges as the more pro-
ficient performer when contrasted with MobileNetV2. This superiority underscores
the potential for ResNet50 to be a potent tool in the arsenal of medical profession-
als for precise and reliable cancer cell predictions. The application of these models
effectively addresses the limitations inherent in traditional image prediction and cat-
egorization methods, markedly enhancing the accuracy of cancer cell identification.
This successful integration of deep learning models in medical diagnostics opens
the door for future research and development. Subsequent work could focus on
employing these models on expansive datasets, exploring various other deep-learning
techniques to further refine predictive capabilities. The continuous evolution of these
technologies promises to bolster the accuracy and efficiency of bone marrow can-
cer diagnosis, ultimately contributing to advancements in medical science and the
improvement of patient care.
REFERENCES
[1] Rehman, A., Abbas, N., Saba, T., Rahman, S. I. U., Mehmood, Z., & Kolivand, H.
(2018). Classification of acute lymphoblastic leukemia using deep learning. Microscopy
Research and Technique, 81(11), 1310–1317.
[2] Zhang, B., Cheng, L., Niu, Y., Wang, A., Zhang, P., Shen, T., . . . & Li, S. (2022). Identi-
fication tool for gastric cancer based on integration of 33 clinical available blood indices
through deep learning. IEEE Access, 10, 106081–106092.
[3] Kumar, D., Jain, N., Khurana, A., Mittal, S., Satapathy, S. C., Senkerik, R., & Hemanth,
J. D. (2020). Automatic detection of white blood cancer from bone marrow microscopic
images using convolutional neural networks. IEEE Access, 8, 142521–142531.
[4] Khan, S., Sajjad, M., Hussain, T., Ullah, A., & Imran, A. S. (2020). A review of tra�-
ditional machine learning and deep learning models for WBCs classification in blood
smear images. IEEE Access, 9, 10657–10673.
[5] Elhassan, T. A. M., Rahim, M. S. M., Swee, T. T., Hashim, S. Z. M., & Aljurf, M. (2022).
Feature extraction of white blood cells using CMYK-moment localization and deep
learning in acute myeloid leukemia blood smear microscopic images. IEEE Access, 10,
16577–16591.
318 Computational Intelligence in Biomedical and Health Informatics
[6] Akram, N., Adnan, S., Asif, M., Imran, S. M. A., Yasir, M. N., Naqvi, R. A., & Hussain,
D. (2022). Exploiting the multiscale information fusion capabilities for aiding the leu-
kemia diagnosis through white blood cell segmentation. IEEE Access, 10, 48747–48760.
[7] Shafique, S., & Tehsin, S. (2018). Acute lymphoblastic leukemia detection and classifi-
cation of its subtypes using pre-trained deep convolutional neural networks. Technology
in Cancer Research & Treatment, 17, 1533033818802789.
[8] Zhu, J., Teolis, S., Biassou, N., Tabb, A., Jabin, P. E., & Lavi, O. (2020). Tracking the
adaptation and compensation processes of patients’ brain arterial network to an evolving
glioblastoma. IEEE Transactions on Pattern Analysis and Machine Intelligence, 44(1),
488–501.
[9] Singh, P., & Bhambri, P. (2007). Alternate organizational models for ports. Apeejay
Journal of Management and Technology, 2(2), 9–17.
[10] Song, Y., & Ma, R. (2022). Multiple omics analysis of the Rac3 roles in different types
of human cancer. IEEE Access, 10, 92633–92650.
[11] Kaur, D., Singh, B., & Rani, S. (2023). Cyber security in the metaverse. In Handbook
of Research on AI-Based Technologies and Applications in the Era of the Metaverse
(pp. 418–435). IGI Global.
[12] Basij, M., Karpiouk, A., Winer, I., Emelianov, S., & Mehrmohammadi, M. (2020).
Dual-illumination ultrasound/photoacoustic system for cervical cancer imaging. IEEE
Photonics Journal, 13(1), 1–10.
[13] Islam, M. T., Tang, S., Tasciotti, E., & Righetti, R. (2021). Non-invasive assessment of
the spatial and temporal distributions of interstitial fluid pressure, fluid velocity, and fluid
flow in cancers in vivo. IEEE Access, 9, 89222–89233.
[14] Wang, S., He, G., Wang, S., Zhang, S., & Fan, F. (2020). Research on recognition of
medical image detection based on neural networks. IEEE Access, 8, 94947–94955.
[15] Kataria, A., Puri, V., Pareek, P. K., & Rani, S. (2023, July). Human activity classification
using G-XGB. In 2023 International Conference on Data Science and Network Security
(ICDSNS) (pp. 1–5). IEEE.
[16] Wang, L., Shi, B., Li, P., Zhang, G., Liu, M., & Chen, D. (2020). Short-term heart
rate variability and blood biomarkers of gastric cancer prognosis. IEEE Access, 8,
15159–15165.
[17] Bhambri, P., Singh, R., & Singh, J. (2007). Wireless security. In UGC Sponsored
National Conference (Abstract Book Page No. 101) on “Emerging Trends in Communi‑
cation & IT” (p. 290), HRMMV, Jalandhar, 29–30 September 2005.
[18] Das, P. K., Diya, V. A., Meher, S., Panda, R., & Abraham, A. (2022). A systematic review
of recent advancements in deep and machine learning-based detection and classification
of acute lymphoblastic leukemia. IEEE Access, 10, 81741–81763.
[19] Shah, A., Naqvi, S. S., Naveed, K., Salem, N., Khan, M. A., & Alimgeer, K. S.
(2021). Automated diagnosis of leukemia: a comprehensive review. IEEE Access, 9,
132097–132124.
[20] Bhambri, P., Gupta, S., & Bhandari, A. (2005, March). Soft computing techniques. In
Paper Presented at the National Conference on Emerging Computing Technologies,
35–41.
[21] Sundari, M. S., Jadala, V. C., & Pasupuleti, S. K. (2022, June). Prediction of activ-
ity pattern mining for neurological disease using convolution neural network.
In 2022 7th International Conference on Communication and Electronics Systems
(ICCES) (pp. 1319–1324). IEEE.
[22] Bhambri, P., & Sharma, N. (2005, September). Priorities for sustainable civilization.
In Paper Presented at the National Conference on Technical Education in Globalized
Environment- Knowledge, Technology & The Teacher, 108.
Marrow Cancer Detection From Leukocytes using Neural Networks 319
[23] Shanmuga Sundari, M., Sudha Rani, M., & Ram, K. B. (2022, September). Acute leu-
kemia classification and prediction in blood cells using convolution neural network. In
International Conference on Innovative Computing and Communications: Proceedings
of ICICC 2022 (Vol. 1, pp. 129–137). Springer Nature Singapore.
[24] Wetteland, R., Kvikstad, V., Eftestøl, T., Tøssebro, E., Lillesand, M., Janssen, E. A.
M., & Engan, K. (2021, August 26). Automatic Diagnostic Tool for Predicting Cancer
Grade in Bladder Cancer Patients Using Deep Learning. IEEE.
[25] www.kaggle.com/datasets/avk256/cnmc-leukemia.
[26] Singh, P., Bhambri, P., & Sohal, A. K. (2006, January). Security in local networks. In
Paper Presented at the National Conference on Future Trends in Information Technology.
[27] Raju, C. S. K., Pranitha, K., Samyuktha, P., & Madhumathi, J. (2022, March). Predic-
tion of COVID-19-chest image classification and detection using RELM classifier in
machine learning. In 2022 8th International Conference on Advanced Computing and
Communication Systems (ICACCS) (Vol. 1, pp. 1184–1188). IEEE.
[28] Singh, M., Singh, P., Bhambri, P., & Sachdeva, R. (2005). A comparative study: secu-
rity algorithms. In U.G.C. Sponsored National Seminar (Abstract Book Page No. 26)
on “Network Security and Its Implementations” (p. 14), Doaba College, Jalandhar, 1
March 2005.
[29] Puri, V., Kataria, A., Rani, S., & Pareek, P. K. (2023, September). DLT based smart med-
ical ecosystem. In 2023 International Conference on Network, Multimedia and Informa‑
tion Technology (NMITCON) (pp. 1–6). IEEE.
[30] Rani, S., Mishra, A. K., Kataria, A., Mallik, S., & Qin, H. (2023). Machine l earning-based
optimal crop selection system in smart agriculture. Scientific Reports, 13(1), 15997.
[31] Rani, S., Kumar, S., Kataria, A., & Min, H. (2023). SmartHealth: An intelligent frame-
work to secure IoMT service applications using machine learning. ICT Express, 48, 1–6.
[32] Rani, S., Kataria, A., Kumar, S., & Tiwari, P. (2023). Federated learning for secure
IoMT-applications in smart healthcare systems: A comprehensive review. Knowledge-
Based Systems, 110658.
22 Pulmonary and Lungs
Nodule Classification
using Deep Learning
Sundari M. Shanmuga and Pankaj Bhambri
22.1 INTRODUCTION
The lungs serve as the principal respiratory organs in humans and the majority of
other animals. According to Figure 22.1, lungs are present in a bilateral arrangement.
They play a crucial role in the respiratory system by facilitating gas exchange. This
process entails the extraction of oxygen from the air and its transportation into the
bloodstream, while concurrently expelling carbon dioxide from the bloodstream into
the atmosphere. Lung cancer and pneumonia are two respiratory conditions that can
adversely affect lung tissue. Uncontrolled division of aberrant cells in a body part is
the primary reason of cancer. Among all malignancies, cancer in the lung is placed
third in terms of importance. When gene mutations in the cells’ DNA mutate and
encourage unnatural grow, lung cancer, also recognized as lung carcinoma, is distin-
guished by malignant tumors.
A region of the human body is covered in a sequence of cross-sectional images
created by computed tomography (CT) [1]. These CT pictures can be analyzed to
identify the lung nodules and to identify whether the CT scans are malignant or not.
A lung nodule, often known as a “spot on the lungs” or a “coin lesion,” is a
tiny, circular tumor in the lung. Nodules are less than 3 cm in diameter. As seen
in Figure 22.2, a nodule could indeed develop anywhere in the lung. The growth
is referred to as a pulmonary mass and is cancerous if it is greater than that. Lung
nodules are typically asymptomatic and can only be seen on computed tomography
scans or conventional X-rays.
Lung cancer is represented by the lung nodules. The histological investigation,
which is invasive and time-consuming, has historically been required to diagnose the
pathological type of lung cancer. This conventional method of classifying lung CT
pictures is less precise since there are not as many of them, which gives the radiolo-
gist [2] less information. The development of computer-aided systems improves CT
[3] scan categorization accuracy by eradicating all shortcomings in the conventional
approach.
The target of this research is to precisely identify nodules, which will aid in the
early detection of cancer and help save lives. Different fully linked deep learning
approaches are used to extract the features and categorize them. We would train a
convolutional neural network to recognize lung and pulmonary nodule, to categorize
the lung as malignant or not, and if cancerous, to determine the type of lung cancer
22.2 LITERATURE SURVEY
Muzammmil explains the lungs’ aberrant and uncontrolled tissue growth that
invades the organs nearby is known as lung cancer. The emergence of pulmonary
nodules suggests lung disease. We employ the deep convolutional neural networks
322 Computational Intelligence in Biomedical and Health Informatics
(DCNNs) [4] model to categorize the lung nodule as hazardous or dangerous. Using
ensemble learners fusion approaches, unsatisfactory results, such as those with lim-
ited response space and inaccurate hypothesis space selection, can be addressed
(MAX-VOTE).
Ying Chen [5] conducted a thorough investigation that demonstrated the signifi-
cance of accurately classifying nodules at the time of lung cancer diagnosis, as this
has a direct bearing on the prognosis for patients. The study used lung adenosqua-
mous carcinoma (ASC) samples, which are relatively infrequent, for the purpose of
addressing the existing deficiency in computer-assisted treatment for different forms
of lung cancer. The study [6] also offered a machine diagnosis approach that utilizes
medical imaging of adenocarcinoma of the lung (ASC), squamous cell carcinoma of
the lung (LUSC), and small cell unit lung cancer (SCLC).
Shortness of breath, dry coughing, and difficult breathing are all signs of ILD [7]
and have a negative impact on health. This spares the handler from having to retrain
the connection for every area of interest, which needs a lot of system time, processing
power, and human skills [8].
In this work, Pranjal Sahu created a brand-new characterizing lesion [9] using a
three-dimensional CNN for classifying lung nodules and determining their propen-
sity to be malignant. The trial’s findings showed how effectively our recommended
model outperformed a variety of state-of-the-art classification strategies.
Electrical bio-impedance of normal and tumor-free lungs was examined in this
study. Across-the-board area of the chest with the bio-impedance probe first records
the bio-impedance of certain normal lung sections, and the measurement values are
then categorized using the suggested smart technology [10].
Andrew Beers [11] explained that the majority of cancer-related deaths in the
United States are caused by lung cancer. Recent research has shown that adopting
low-dose CT (LDCT) for screening can lower lung cancer-related mortality. Initially,
an adaptive data preprocessing approach, slicing selection (ASS) [12], was created
in order to reduce the excessive disturbance in the intake of samples that contain
carcinoma. The self-supervised learning network is subsequently developed in order
to get a trustworthy picture representations from CT scans. The development of a
domain-adaptive transfer learning method is the final step.
As part of the knowledge-based collaboration (KBC) model [13], three early
learning ResNet50 networks are tuned using three distinct kinds of photo chunks
to characterize the appearances of a lesions per each view. Stelmo Magalhaes
Barros Netto used the quantity threshold’s segmentation method [14] in a modified
form in order to evaluate how lesions change over time and which voxel of the lesion
belongs to a group.
Computational approaches can be useful for supporting, storing, and monitor-
ing computer-aided diagnosis in critical care [15]. Spectrum correction is used to
adjust for alterations in camcorder parameters on the ICBHI dataset. According to
Pin Lim [16], with an uneven number of samples in each category, class imbalance
is a problem that machine learning regularly runs into. Machine learning encounters
significant challenges when working with unequal data, according to Zonghai Zhu.
A geometric structural ensemble (GSE) [17] learning paradigm is put up as a solution
to the unbalanced problems. It has been demonstrated that ensemble learning [18]
Pulmonary and Lungs Nodule Classification using Deep Learning 323
approaches for classification may greatly enhance the efficiency of a basic learning
algorithm.
22.3 PROPOSED SYSTEM
Lung CT scans can be categorized using VGG16 and InceptionV3 deep learning
approaches. The four types of lung cancer detected by CT scanning are normal or
uninfected lung, adeno, carcinoma, and squamous.
22.3.1 Methodology
The proposed model’s architecture as in Figure 22.3 can be broken down into six
phases or six steps. Data gathering comes first, then data augmentation. Data is gath-
ered from Kaggle [19]. It consists of 1000 images of type PNG taking up to 124 MB
memory in which 613 images are used for training, 72 images for validating, and 315
images for testing.
This is done to increase the dataset in order to boost the model’s performance since
the more variations there are, the more experiences the model may get. InceptionV3
and VGG16 [20] are utilized to prepare and train the prototype. Then the model is
used to test before being made available to the public. By calculating the metrics, the
degree to which the model findings may be trusted for accuracy can be determined.
22.3.2 Algorithm VGG16
VGG is an abbreviation for visual geometry group. Convolutional neural networks
(CNNs) consist of hidden layers, an input layer, and an output layer. VGG16 is an
example of a convolutional neural network (CNN). The number “16” in VGG16 rep-
resents the presence of 16 layers in the model, each with its own set of weights.
In order to obtain the desired result of 1*1, as shown in Figure 22.4, the VGG16
model consists of 13 convolutional layers, five Max Pooling layers [21], and three
dense layers, making a total of 21 layers. However, out of these layers, only 16 are
weight layers, which are also referred to as learnable parameter levels.
Convolutional neural networks are a type of neural network topologies that are
extensively used in different domains, especially in computer vision. CNNs, which
are designed to replicate the visual processing capabilities of the human brain,
demonstrate exceptional performance in several tasks. The distinguishing features
of this customized architecture are its distinct components and actions.
Convolutional neural networks (CNNs) generally comprise various layers.
Convolutional layers utilize filters or kernels to perform convolutions on incom-
ing data, effectively capturing spatial hierarchies and acquiring features through
learning. Pooling layers, typically with max pooling, decrease the size of the spatial
dimensions, resulting in reduced computational complexity while still preserving
crucial information. The fully connected layers are responsible for processing the
extracted characteristics in order to perform the final classification.
One defining feature of CNNs is their ability to automatically learn hierarchi-
cal representations. Through backpropagation and optimization algorithms, CNNs
adjust their parameters during training, enabling the extraction of intricate features
and patterns. This hierarchical learning makes CNNs adept at recognizing complex
visual structures and improving performance on various tasks.
CNNs have demonstrated remarkable success in diverse applications, from image
and speech recognition to medical image analysis. The architecture’s adaptability
Pulmonary and Lungs Nodule Classification using Deep Learning 325
and efficacy stem from its capacity to automatically learn relevant features from raw
input data, making CNNs a cornerstone in the advancement of artificial intelligence
and machine learning.
22.3.3 Algorithm InceptionV3
In the quest to mitigate overfitting, Inception models employ a distinctive strategy by
incorporating multiple filters of varying sizes within the same network level. Unlike
traditional deep layers, Inception models opt for a parallel architecture, as depicted
in Figure 22.5, which expands the model’s width rather than delving deeper into its
layers. An evolution of the Inception model, known as InceptionV3, addresses short-
comings present in earlier versions. Notable improvements include spatial factoriza-
tion through asymmetric convolutions, resulting in a reduction of model parameters
and a more streamlined processing time [22–24].
The selection of deep learning methods, particularly InceptionV3, is deliberate,
chosen for their practicality and adaptability. These methods prove instrumental in
predicting the presence of lung or pulmonary nodules. The training process involves
teaching the models to classify test images into distinct groups, honing their ability
to accurately discern and categorize lung-related features. This method demonstrates
an advanced and subtle application of deep learning techniques to improve the accu-
racy and dependability of lung cancer detection [25, 26].
InceptionV3 is a prominent convolutional neural network architecture that has
proven to be highly effective in image classification and recognition tasks. Developed
by Google, InceptionV3 builds upon its predecessors, addressing limitations and
introducing innovative design elements.
326 Computational Intelligence in Biomedical and Health Informatics
The core principle behind InceptionV3 is the use of inception modules, which are
responsible for capturing information at multiple spatial scales. Unlike traditional
architectures that rely on deep layers, InceptionV3 utilizes parallel convolutional lay-
ers of different kernel sizes within the same level, expanding the network’s width
rather than depth. This methodology enables the model to comprehend and include
both intricate and broad elements, hence improving its capacity to identify complex
patterns in images.
InceptionV3 employs factorized convolutions, specifically asymmetric convolu-
tions, to mitigate computational demands. By reducing the number of parameters in
the model, this factorization technique improves computational efficiency without
sacrificing performance. Furthermore, the architecture incorporates global average
pooling, eliminating the need for fully connected layers and further reducing the
model’s complexity.
The InceptionV3 model is renowned for its application in picture classification
problems. This model has undergone pretraining on extensive datasets, such as
ImageNet, which allows for the use of transfer learning in various contexts. The
inception blocks, coupled with normalization and linear unit (ReLU) activations,
contribute to the model’s robust feature extraction capabilities.
InceptionV3 has demonstrated the performance metrics and competitions, show-
casing its versatility and effectiveness in handling complex visual recognition chal-
lenges. Its innovative design, incorporating diverse convolutional operations and
efficient factorization, makes InceptionV3 a valuable asset in the realm of deep learn-
ing, influencing subsequent architectures and contributing to the ongoing evolution
of neural network designs.
Pulmonary and Lungs Nodule Classification using Deep Learning 327
22.4 RESULT
On the CT images produced through data augmentation, the models are trained and
tested. The expected pulmonary and lung nodules are categorized by the models.
InceptionV3 performs better than VGG16 in comparison, as seen in Figure 22.6.
22.4.1 Discussion
The outcomes of the experiments are systematically presented in Table 22.1, where in
the models, specifically InceptionV3 and VGG16, are subjected to a series of test
images categorized into distinct classes: normal, adeno, large, and squamous cell
carcinoma. This tabular representation serves as a comprehensive summary, allow-
ing for a detailed examination of the models’ performance across various lung can-
cer categories. To provide a visual depiction of the comparative accuracy of these
TABLE 22.1
Representing the Model Performance
S. No. Algorithm Accuracy
1 CNN 54.9%
2 VGG16 79.36%
3 InceptionV3 81.904%
22.5 CONCLUSION
Predicting the existence of pulmonary nodules or lung nodules makes it easy to
identify lung cancer. To make up for the lack of CT pictures, data augmentation is
used, and the generated CTs are trained, validated, and tested using the produced
CT images. The nodules are predicted with the aid of the VGG-16 and InceptionV3
models. These computer-aided systems help doctors in the early diagnosis of lung
cancer, leading to early-stage detection and faster recovery. InceptionV3 performed
better compared to VGG16. The shortcomings of the conventional prediction and
330 Computational Intelligence in Biomedical and Health Informatics
categorization of CT scans are overcome by these models, which improve the accu-
racy of properly predicting the nodules. The anticipated nodules are further divided
into classification. Future work can be done on huge datasets with various other
available deep learning techniques.
REFERENCES
[1] Ali, I., Muzammil, M., Haq, I. U., Khaliq, A. A., & Abdullah, S. (2021). Deep feature
selection and decision level fusion for lungs nodule classification. IEEE Access, 9,
18962–18973.
[2] Ardimento, P., Aversano, L., Bernardi, M. L., & Cimitile, M. (2021, July). Deep neural
networks ensemble for lung nodule detection on chest CT scans. In 2021 International
Joint Conference on Neural Networks (IJCNN) (pp. 1–8). IEEE.
[3] Pande, N. A., & Bhoyar, D. (2022, January). A comprehensive review of lung nod-
ule identification using an effective computer-aided diagnosis (CAD) system. In 2022
4th International Conference on Smart Systems and Inventive Technology (ICS‑
SIT) (pp. 1254–1257). IEEE.
[4] Muzammil, M., Ali, I., Haq, I. U., Khaliq, A. A., & Abdullah, S. (2021). Pulmonary nod�-
ule classification using feature and ensemble learning-based fusion techniques. IEEE
Access, 9, 113415–113427.
[5] Chen, Y., Wang, Y., Hu, F., Feng, L., Zhou, T., & Zheng, C. (2021). LDNNET: Towards
robust classification of lung nodule and cancer using lung dense neural network. IEEE
Access, 9, 50301–50320.
[6] Li, M., Ma, X., Chen, C., Yuan, Y., Zhang, S., Yan, Z., . . . & Ma, M. (2021). Research on
the auxiliary classification and diagnosis of lung cancer subtypes based on histopatho-
logical images. IEEE Access, 9, 53687–53707.
[7] Wang, Q., Zheng, Y., Yang, G., Jin, W., Chen, X., & Yin, Y. (2017). Multiscale
rotation-invariant convolutional neural networks for lung texture classification. IEEE
Journal of Biomedical and Health Informatics, 22(1), 184–195.
[8] Mobiny, A., Yuan, P., Cicalese, P. A., Moulik, S. K., Garg, N., Wu, C. C., . . . & Nguyen,
H. V. (2021). Memory-augmented capsule network for adaptable lung nodule classifica�-
tion. IEEE Transactions on Medical Imaging, 40(10), 2869–2879.
[9] Sahu, P., Yu, D., Dasari, M., Hou, F., & Qin, H. (2018). A lightweight multi-section CNN
for lung nodule classification and malignancy estimation. IEEE Journal of Biomedical
and Health Informatics, 23(3), 960–968.
[10] Baghbani, R., Shadmehr, M. B., Ashoorirad, M., Molaeezadeh, S. F., & Moradi, M.
H. (2021). Bioimpedance spectroscopy measurement and classification of lung tissue
to identify pulmonary nodules. IEEE Transactions on Instrumentation and Measure‑
ment, 70, 1–7.
[11] Balagurunathan, Y., Beers, A., Mcnitt-Gray, M., Hadjiiski, L., Napel, S., Goldgof, D.,
. . . & Farahani, K. (2021). Lung nodule malignancy prediction in sequential CT scans:
Summary of ISBI 2018 challenge. IEEE Transactions on Medical Imaging, 40(12),
3748–3761.
[12] Huang, H., Wu, R., Li, Y., & Peng, C. (2022). Self-supervised transfer learning based on
domain adaptation for benign-malignant lung nodule classification on thoracic CT. IEEE
Journal of Biomedical and Health Informatics, 26(8), 3860–3871.
[13] Xie, Y., Xia, Y., Member, IEEE, Zhang, J., Song, Y., Member, IEEE, Feng, D., Fellow,
IEEE, Fulham, M., & Cai, W., Member, IEEE, (2019, April). Knowledge-based collab-
orative deep learning for benign-malignant lung nodule classification on chest CT. IEEE
Transactions on Medical Imaging, 38(4).
Pulmonary and Lungs Nodule Classification using Deep Learning 331
[14] Netto, S. M. B., Diniz, J. O. B., Silva, A. C., de Paiva, A. C., Nunes, R. A., & Gattass, M.
(2018). Modified quality threshold clustering for temporal analysis and classification of
lung lesions. IEEE Transactions on Image Processing, 28(4), 1813–1823.
[15] Nguyen, T., & Pernkopf, F. (2022). Lung sound classification using co-tuning and
stochastic normalization. IEEE Transactions on Biomedical Engineering, 69(9),
2872–2882.
[16] Lim, P., Goh, C. K., & Tan, K. C. (2016). Evolutionary cluster-based synthetic oversam�-
pling ensemble (eco-ensemble) for imbalance learning. IEEE Transactions on Cybernet‑
ics, 47(9), 2850–2861.
[17] Zhu, Z., Wang, Z., Li, D., Zhu, Y., & Du, W. (2018). Geometric structural ensemble learn�-
ing for imbalanced problems. IEEE Transactions on Cybernetics, 50(4), 1617–1629.
[18] Webb, G. I., & Zheng, Z. (2004). Multistrategy ensemble learning: Reducing error by
combining ensemble learning techniques. IEEE Transactions on Knowledge and Data
Engineering, 16(8), 980–991.
[19] www.kaggle.com/datasets/mohamedhanyyy/chest-ctscan-images.
[20] Shanmuga Sundari, M., Sudha Rani, M., & Kranthi, A. (2022). Detect traffic lane image
using geospatial LiDAR data point clouds with machine learning analysis. In Intelligent
System Design: Proceedings of INDIA 2022 (pp. 217–225). Springer Nature Singapore.
[21] Jadala, V. C., Pasupuleti, S. K., & Yellamma, P. (2022, November). Deep Learning
analysis using ResNet for early detection of cerebellar ataxia disease. In 2022 Inter‑
national Conference on Advancements in Smart, Secure and Intelligent Computing
(ASSIC) (pp. 1–6). IEEE.
[22] Kaur, D., Singh, B., & Rani, S. (2023). Cyber security in the metaverse. In Handbook
of Research on AI-Based Technologies and Applications in the Era of the Metaverse
(pp. 418–435). IGI Global.
[23] Puri, V., Kataria, A., Rani, S., & Pareek, P. K. (2023, September). DLT based smart med-
ical ecosystem. In 2023 International Conference on Network, Multimedia and Informa‑
tion Technology (NMITCON) (pp. 1–6). IEEE.
[24] Rani, S., Mishra, A. K., Kataria, A., Mallik, S., & Qin, H. (2023). Machine l earning-based
optimal crop selection system in smart agriculture. Scientific Reports, 13(1), 15997.
[25] Rani, S., Kumar, S., Kataria, A., & Min, H. (2023). SmartHealth: An intelligent frame-
work to secure IoMT service applications using machine learning. ICT Express, 48, 1–6.
[26] Rani, S., Kataria, A., Kumar, S., & Tiwari, P. (2023). Federated learning for
secure IoMT-applications in smart healthcare systems: A comprehensive review.
Knowledge-Based Systems, 110658.
[27] Bhambri, P., & Gupta, S. (2007, September). Interactive voice recognition system. In
National Conference on Advancements in Modeling and simulation (p. 107), LLRIET,
Moga, 20–21 January 2006.
[28] Bhambri, P., & Singh, M. (2008). Image transport protocol for JPEG image over loss
prone congested networks. PIMT Journal of Research, 1(1), 55–61.
[29] Bhambri, P., & Nischal, P. (2008, May). Emerging new economy in telecommunication
sector of India. In International Conference (Abstract Book Page No. 26) on “Business
Challenges & Strategies in Emerging Global Scenario” (p. 26), PCTE, Ludhiana, 30
May 2008.
[30] Bhambri, P., & Thapar, V. (2009, May). Power distribution challenges in VLSI: An intro��-
duction. In Paper Presented at the International Conference on Downtrend Challenges
in IT, p. 63.
[31] Bhambri, P. (2010). An adaptive and resource efficient hand off in recovery state in
geographic Adhoc networks. In International Conference on Engineering Innovations-A
Fillip to Economic Development, CGI, Fatehgarh Sahib, Punjab, 18–20 February 2010.
Index
A G
access control, 61 GDPR (General Data Protection
American Heart Association Risk Calculator, 262 Regulation), 63
artificial intelligence in CVD, 268 compliance, 14
Automated Market Makers (AMM), 57
H
B
healthcare, 1
bioengineering, 3 bioengineering, 1, 4
data analysis, 3 data analysis, 21
biological data integration, 17 data source, 5
biomechanics and computational modelling, 17 machine learning, 209
biomedical systems, 26 tokenization, 221
biomedical signal processing, 17 health data interoperability, 249
blockchain, 20, 79 – 83, 92 – 95 health information precision, 248
advantages and disadvantages, 87 HIPAA compliance, 13
analysis, 70
applications, 85, 105, 126 I
architecture, 66, 124
bitcoin, 68 immutability, 247
challenges and risks, 74, 88 information retrieval, 42, 46
characteristics, 100 biomedical data, 46
comparison, 72 Institutional Review Board (IRB), 14
Ethereum, 69 IoT/ IoMT, 207, 229
frameworks, 68
future perspectives, 89 L
Hyperledger Fabric, 70
integration with AI, 127 latency, 56
structure, 84, 99
types of blockchain networks, 86 M
Q T
QRISK, 261 telemedicine, 175
quantitative tokenization, 40
matrics, 280 translucence, 247
transparency and accountability, 13
R
V
reactor design optimization, 265
remote patient monitoring (RPM) virtual reality and augmented reality, 269
system, 231 visualization, 43
resource management, 56
W
S
Wireless Body Area Networks (WBANs), 173
secure data storage and
transmission, 11 X
sentiment analysis, 42
stemming, 40 XAMPP platform, 199