Discusses topics concerning the privacy preservation of genomic data in the digital era, including data security, data standards, and privacy laws so that researchers in biomedical informatics, computer privacy and ELSI can assess the latest advances in privacy-preserving techniques for the protection of human genomic data.
Privacy Preservation of Genomic and Medical Data focuses on genomic data sources, analytical tools, and the importance of privacy preservation. Topics discussed include tensor flow and Bio-Weka, privacy laws, HIPAA, and other emerging technologies like Internet of Things, IoT-based cloud environments, cloud computing, edge computing, and blockchain technology for smart applications. The book starts with an introduction to genomes, genomics, genetics, transcriptomes, proteomes, and other basic concepts of modern molecular biology. DNA sequencing methodology, DNA-binding proteins, and other related terms concerning genomes and genetics, and the privacy issues are discussed in detail. The book also focuses on genomic data sources, analyzing tools, and the importance of privacy preservation. It concludes with future predictions for genomic and genomic privacy, emerging technologies, and applications.
Audience
Researchers in information technology, data mining, health informatics and health technologies, clinical informatics, bioinformatics, security and privacy in healthcare, as well as health policy developers in public and private health departments and public health.
Table of Contents
Preface xix
Acknowledgements xxi
Part 1: Fundamentals 1
1 Introduction to Genomics and Genetics 3
Mahreen Fatima, Sana Zia, Maheen Murtaza, Asyia Shafique, Afshan Muneer, Junaid Sattar, Muhammad Ashir Nabeel and Amjad Islam Aqib
1.1 Introduction 4
1.2 Hub of Genomics 4
1.3 Genome Sequencing Methods 7
1.4 Variation of Genome Sequencing 9
1.5 Diseases and Disorders 10
1.6 Future Prospects 13
1.7 Conclusion 14
2 An Overview of Genomics and Frontiers in Genetics for Smart Era 19
Saagar Bafna, Akash Shedage, Amber Agarwal, Somya Rakesh Goyal and Istiaque Ahmed
2.1 Introduction 19
2.2 Application of Genomes - The Frontiers in Genetics 21
2.3 Genomics in Military 27
2.4 Genomics in Medicine 29
2.5 International Projects 33
2.6 Case Study 37
2.7 Conclusion 41
3 Technical Trends in Public Healthcare and Medical Engineering 45
Asha Rani Mishra, Amrita Rai, Mohd Dayem Ansari and Ritesh Pratap Singh
3.1 Introduction 46
3.2 Background Work 47
3.3 Current Scenario of Public Healthcare System and Medical Engineering 56
3.4 Role of AI in Healthcare 58
3.5 Technological Analysis for Healthcare System and Medical Engineering 60
3.6 Future Aspects of AI in Healthcare and Medical Engineering 65
3.7 Conclusion 68
3.8 Future Aspect 69
4 Role of Genomics in Smart Era and Its Application in COVID-19 73
Sunil Kumar and Biswajit R. Bhowmik
4.1 Introduction 74
4.2 Basics of Genomics 76
4.3 Evolution of Genomics 80
4.4 Characteristics of Genomics and DNA Computing 83
4.5 Types of Genomics 84
4.6 Application Area of Genomics 88
4.7 Application of DNA Computing 92
4.8 Genomics and DNA Computing in COVID-19 Epidemic 93
4.9 Issues in Genomics and DNA Computing 96
4.10 Tools and Technology Used in Genomics Systems 97
4.11 Role of AI Technology Used in Genomics Systems 98
4.12 Related Works and Challenges 99
4.13 Future Research Dimension 108
4.14 Conclusion 108
Part 2: Methods and Applications 113
5 Novel Cutting-Edge Security Tools for Medical and Genomic Data With Privacy Preservation Techniques 115
A. Rehash Rushmi Pavitra, I. Daniel Lawrence, J. Sarojini Premalatha, P. Kalaiselvi, D. Jena Catherine Bel, C. Esther, G.B. Zionna Sen and G. Gomathy
5.1 Introduction 116
5.2 Background of Genomic 117
5.3 Literature Review 120
5.4 Highlights of the Proposed Methodologies 122
5.5 Results and Discussion 126
5.6 Conclusion 127
6 Genomic Data Analysis With Optimized Convolutional Neural Network (CNN) for Edge Applications 131
Sneha Venkateshalu, Santosh Deshpande and Bharathi Pannyagol
6.1 Introduction 132
6.2 Related Work 135
6.3 Proposed Methodology 140
6.4 Conclusion 147
7 Real-World Estimation of Malaria Prevalence From Genome of Vectors and Climate Analysis 151
Ashvath Narayanan C., Pavitra Vasudevan, Maheswari R., Parvathi R. and Pattabiraman V.
7.1 Introduction 152
7.2 Significance of Estimation of Malaria Prevalence From Genome of Vectors and Climate Analysis 154
7.3 Proposed Methodology 159
7.4 Conclusion 167
8 Revolutionalizing Internet of Medical Things for Blockchain-Based 5G Healthcare Security and Privacy for Genomic Data 171
Shyam Mohan J. S., Guddeti Theekshana and Guddeti Likhit Kumar Reddy
8.1 Introduction 172
8.2 Internet of Things in Healthcare and Medical Applications (IoMT) 173
8.3 Limitations of Existing Technologies in Healthcare Applications 176
8.4 Solving Healthcare Problems Using BCT 177
8.5 Proposed Model for 5G Healthcare 178
8.6 Experimental Setup and Discussion 181
8.7 Results 182
8.8 Conclusion 185
9 Preserve Privacy-HD: A Privacy-Preserving Distributed Framework for Health Data 189
Aswathy Ravikumar and Harini Sriraman
9.1 Introduction 189
9.2 Organization of Chapter 194
9.3 Related Work 194
9.4 Proposed Methodology 195
9.5 Complexity Analysis 206
9.6 Conclusion 209
Part 3: Future-Based Applications 213
10 Decision and Recommendation System Services for Patient Using Artificial Intelligence 215
Arjun Tandon, Raghav Dangey, Anand Kumar Mishra, G. Balamurugan and Amit Kumar Tyagi
10.1 Introduction 216
10.2 Literature Review 219
10.3 Proposed Methodology 225
10.4 Implementation and Results Analysis 232
10.5 Results and Discussion 233
10.6 Conclusion 236
11 MPHDRDNN: Meticulous Presaging of Heart Disease by Regularized DNN Through GUI 243
Ritu Aggarwal and Suneet Kumar
11.1 Introduction 244
11.2 Literature Study 244
11.3 Proposed Methodology 246
11.4 Performance Evaluation Metrics 252
11.5 Results and Implementation Process for Building a GUI 257
11.6 Conclusion and Future Scope 259
12 Techniques for Removing Hair From Dermoscopic Images: A Survey of Current Approaches 263
Ranjita Rout, Priyadarsan Parida, Sonali Dash and Sandipan Mallik
12.1 Introduction 264
12.2 Inpainting Techniques Used for Hair Removal From Dermoscopic Images 265
12.3 Hair Removal Approaches From Dermoscopic Images 267
12.4 Results and Discussion 274
12.5 Conclusion 278
13 The Emergence of Blockchain Technology in Industrial Revolution 5.0 283
Meenu Gupta, Chetanya Ved, Saransh Khetarpaul, Anmol Dhingra and Sanjana Deswal
13.1 Introduction 284
13.2 Literature Survey 285
13.3 Evolution of Web Technology in Association With Blockchain 290
13.4 Understanding of Basic Key Terminologies 293
13.5 Industrial Components Associated With Blockchain 298
13.6 Contribution of Blockchain for Revolutionizing Industrial Aspects 302
13.7 Transformation of Industrial Sectors by Blockchain 311
13.8 Economical Impact Analysis of Blockchain Over Each Industry 320
13.9 Conclusion 323
14 Cervical Cancer Detection Using Big Data Analytics and Their Comparative Analysis 327
V. Lakshmi Narasimhan and W. Tumisang Zaphaniah
14.1 Introduction 327
14.2 Related Literature 329
14.3 Machine Learning Algorithms Used 330
14.4 Description of the Dataset 335
14.5 Parameter Specification on the ANNs 341
14.6 Analysis of Results 342
14.7 Conclusions 357
15 Smart Walking Stick for Visually Impaired People 361
Dhilip Karthik M., Rizwan Mohamed Kareem, Nisha V. M. and Sajidha S. A.
15.1 Introduction 361
15.2 Related Work 365
15.3 System Architecture 372
15.4 Conclusion 378
Part 4: Issues and Challenges 383
16 Enhanced Security Measures in Genomic Data Management 385
Ambika N.
16.1 Introduction 386
16.2 Literature Survey 387
16.3 Background 399
16.4 Proposed Model 400
16.5 Analysis of the Work 403
16.6 Future Work 405
16.7 Conclusion 405
17 Industry 5.0: Potentials, Issues, Opportunities, and Challenges for Society 5.0 409
Amit Kumar Tyagi, R. Lakshmi Priya, Anand Kumar Mishra and G. Balamurugan
17.1 Introduction 410
17.2 Literature Review 413
17.3 Role of Robots in Industry 5.0 and Society 5.0 414
17.4 Potentials of Industry 5.0 and Society 5.0 418
17.5 Open Issues Toward Industry 5.0 and Society 5.0 420
17.6 Opportunities and Challenges Toward Industry 5.0 and Society 5.0 421
17.7 Conclusion 428
18 Artificial Intelligence - Blockchain Enabled Technology for Internet of Things: Research Statements, Open Issues, and Possible Applications in the Near Future 433
Shabnam Kumari and P. Muthulakshmi
18.1 Introduction: Artificial Intelligence, Machine Learning, Internet of Things, and Blockchain Concepts 434
18.2 Frameworks, Architectures, and Models for the Convergence of Machine Learning, IoTs, and Blockchain Technologies 436
18.3 Machine Learning Techniques for the Optimization of IoT-Based Services 438
18.4 Machine Learning Techniques for Exchanging Data in a Blockchain 442
18.5 Machine Learning-Based Blockchain Transactions 444
18.6 IoT-Enabled Security Using Artificial Intelligence and Blockchain Technologies 446
18.7 Security, Privacy, and Trust Related Areas in Artificial Intelligence and Blockchain-Based IoT Applications 451
18.8 Blockchain-Based Learning Automated Analytics Platforms 455
18.9 Blockchain- and Machine Learning-Based Solutions for Big Data Challenges 457
18.10 Machine Learning Techniques for the Analysis of Sensor Records for Healthcare Applications 460
18.11 Blockchain-Enabled IoT Platforms for Automation in Intelligent Transportation Systems 462
18.12 Conclusion 473
19 Blockchain-Empowered Decentralized Applications: Current Trends and Challenges 481
Atharva Deshmukh, Anand Kumar Mishra, G. Balamurugan and Amit Kumar Tyagi
19.1 Introduction 482
19.2 Literature Survey 483
19.3 Key Characteristics of Blockchain 484
19.4 Challenges Faced by Blockchain Technology 485
19.5 The Use of Smart Contracts in Decentralized Autonomous Organizations 487
19.6 Smart Contracts: An Overview 489
19.7 Smart Contract Platforms 490
19.8 Applications of Blockchain Technology 491
19.9 Future Data Storage Issues in Blockchain and Its Solution 497
19.10 Conclusion 498
20 Privacy of Data, Privacy Laws, and Privacy by Design 503
Elanur Özmen and Aswani Kumar Cherukuri
20.1 Introduction 503
20.2 Privacy Issues 505
20.3 Privacy Laws and Regulatýons 512
20.4 Techniques for Enforcing Privacy 518
20.5 Privacy by Design 521
20.6 Conclusion 524
References 526
Index 529