• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Deep Learning Enabled Disease Diagnosis for Secure Internet of Medical Things

    2022-11-10 02:30:18SultanAhmadShakirKhanMohamedFahadAlAjmiAshitKumarDuttaMinhDangGyanendraPrasadJoshiandHyeonjoonMoon
    Computers Materials&Continua 2022年10期

    Sultan Ahmad,Shakir Khan,Mohamed Fahad AlAjmi,Ashit Kumar Dutta,L.Minh Dang,Gyanendra Prasad Joshi and Hyeonjoon Moon,*

    1Department of Computer Science,College of Computer Engineering and Sciences,Prince Sattam Bin Abdulaziz University,Alkharj,11942,Saudi Arabia

    2College of Computer and Information Sciences,Imam Mohammad Ibn Saud Islamic University(IMSIU),Riyadh,11432,Saudi Arabia

    3College of Pharmacy,King Saud University,Riyadh,11451,Saudi Arabia

    4Department of Computer Science and Information System,College of Applied Sciences,AlMaarefa University,Riyadh,11597,Saudi Arabia

    5Department of Information Technology,FPT University,Ho Chi Minh City,Vietnam

    6Department of Computer Science and Engineering,Sejong University,Seoul,05006,Korea

    Abstract:In recent times,Internet of Medical Things (IoMT) gained much attention in medical services and healthcare management domain.Since healthcare sector generates massive volumes of data like personal details,historical medical data,hospitalization records,and discharging records,IoMT devices too evolved with potentials to handle such high quantities of data.Privacy and security of the data,gathered by IoMT gadgets,are major issues while transmitting or saving it in cloud.The advancements made in Artificial Intelligence (AI) and encryption techniques find a way to handle massive quantities of medical data and achieve security.In this view,the current study presents a new Optimal Privacy Preserving and Deep Learning(DL)-based Disease Diagnosis(OPPDL-DD)in IoMT environment.Initially,the proposed model enables IoMT devices to collect patient data which is then preprocessed to optimize quality.In order to decrease the computational difficulty during diagnosis,Radix Tree structure is employed.In addition,ElGamal public key cryptosystem with Rat Swarm Optimizer(EIG-RSO)is applied to encrypt the data.Upon the transmission of encrypted data to cloud,respective decryption process occurs and the actual data gets reconstructed.Finally,a hybridized methodology combining Gated Recurrent Unit(GRU)with Convolution Neural Network (CNN) is exploited as a classification model to diagnose the disease.Extensive sets of simulations were conducted to highlight the performance of the proposed model on benchmark dataset.The experimental outcomes ensure that the proposed model is superior to existing methods under different measures.

    Keywords:Internet of medical things;privacy;security;encryption;radix tree;deep learning

    1 Introduction

    Internet of Medical Things (IoMT) is an environment of clinical systems,healthcare devices,wearable devices,and interconnected sensors[1-3].The concept ensures seamless functioning and inter-communication of numerous healthcare applications to increase the quality of medical treatment,provide timely medical replies and reduce costs incurred upon health care.It mainly encompasses the improvements made in sensor networks,mobile devices,Big Data Analysis (BDA),wireless communications,and Cloud Computing (CC) to achieve seamless communication of medical data.IoMT has transformed the healthcare industry radically by distributing personalized and targeted medication.The increased penetration of medical devices across global healthcare settings brought various advantages.However,it has also increased the privacy and security problems in multiple folds.The modern healthcare system gathers and processes complex and frequent life-critical medical data and makes crucial decisions depending on the data[4].In this background,cybercriminals target vulnerable areas in IoMT devices.Though they cannot obtain significant access to the clinic network,they can gain illegal access to sensitive personal and healthcare data.Cyberattacks made on these healthcare and related devices tend to bring major physical and life-threatening injuries to the persons.Thus,privacy preserving method is considered to be one of the most important elements in this technology era.

    IoMT utilizes different kinds of Machine Learning (ML) techniques to predict and understand healthcare modifications from separate standards[5,6].Planned emotional support system can improve medical results(like decreased medicinal dishonesty)alike how hierarchical results increase(for example,efficiency development and homework)[7].Additionally,ML methods can improve the framework for monitoring a person’s day-to-day life activities by continuously learning from their personal data(for example,basic life signals)and help them achieve healthcare at a right time.This sort of data collection seems to be significant in improving the program without reservation and altering it during various phases.Once the data is gathered,it can be transferred to medical personnel or specialists to check the person’s state[8].To resolve the challenges faced in security,health care industry has found a method that utilizes Internet of Things (IoT).In this method,patients and healthcare professionals can communicate directly with each other through cell phone and a consultant can know the patient’s conditions based on their specialization at clinic[9,10].Furthermore,the patient need not regularly attend a tertiary hospital.The ultimate aim of this remote healthcare management is to stimulate patient healthcare and rapidly notify the healthcare professionals in case of an emergency[11].

    The embedding of edge computation creates potential,powerful and delay-sensitive healthcare applications whereas CC provides the maximum assets for storage memory.In addition,edge and cloud computing bring efficient developments in healthcare field.In the application of modern computational methods,Deep Learning (DL) has been broadly utilized for understanding several domains such as object identification,Natural Language Processing,and image classification.Both compression and self-taught capability of DL helps in learning the features of input data automatically and hierarchically.This guarantees to emphasize the abnormal and hidden patterns in the data[12,13].Consequently,DL method has evolved with much efficiency due to high number of IoTbased applications.A wide range of DL techniques has been utilized in problem solving methods with respect to healthcare.The usefulness of DL is achieved by utilizing deep layers which are in-built in the framework that makes the technique,a highly intensive one.Therefore,a minimum-powered edge device is not appropriate to improve the DL technique.Subsequently it cannot fulfill the highest computation cost necessities of DL approach too.The main challenge included in deploying effective latency-aware health monitoring system is its dependency upon the embedding of DL implication to edge devices that have recovered computation capabilities.

    The current research paper develops an Optimal Privacy Preserving and DL-based Disease Diagnosis (OPPDL-DD) method in IoMT environment.The proposed model primarily allows the IoMT devices to gather patient data and preprocess it to improve its quality.In order to reduce the computational complexity during diagnosis,Radix Tree structure is employed.The presented model also includes ElGamal public key cryptosystem with Rat Swarm Optimizer (EIG-RSO) to achieve security.At last,a hybridized HGRU-CNN model(comprising GRU and CNN models)is applied as a classification model for disease diagnosis.A wide-range of simulations was conducted to showcase the superiority of the proposed OPPDL-DD model upon benchmark dataset.

    Rest of the paper is organized as follows.Section 2 discusses the works related to the domain,Section 3 briefs the proposed model,Section 4 validates the results,and Section 5 draws the conclusion for the study.

    2 Literature Review

    Cloud IoT has developed a skillful prediction and analytical method for diagnostics.Currently,several diagnostic methods are utilized to find out the diseases like breast cancer,brain disorders,Alzheimer’s disease,cardiovascular diseases,thyroid diseases,hypotension,and leukemia heart disease[14].For instance,a neuro-fuzzy framework is frequently utilized in creation systems,quality control,social security administrations,executive execution,and emergency situations.The medical services involve the facilitation of workers followed by maintenance and transit of medicinal assets.It also should meet the social security requirements of an individual.Zhang et al.[15]established a strong and Patented Privacy Data Protection system(PPDP).An individual’s medical reports are encrypted in PPDP and then transmitted to cloud.For novel medical data,disease risk is determined based on the prediction pattern.Specifically,PPDP increases the application of arbitrary networks to examine the recent utilization of disease prediction methods,data encryption,and disease research.

    Chen et al.[16]developed a predictive disease framework utilizing ML method for big data collected in healthcare network.This research was conducted with several prognostic methods that depend upon the information gathered from actual medical hospital located at Focal China between 2013 and 2015.To conquer the difficulty of fragmentary data,the method utilized inactive factor testing to retrieve the lost information.Additional modification was proposed in CNN to remove the probability of establishing unstructured multi-modal data,while utilizing medical diagnoses.Kaur et al.[17]conducted an extensive review of healthcare diagnostic procedures proposed so far.Big data techniques have been demonstrated to streamline the rapid growth of healthcare information.It initially checks the condition of big data in medical field though no crucial task has been performed in this domain.It is difficult to assume the influence of ML and big data in medical systems.

    Lakshmanaprabu et al.[18]proposed a method to combat the confusions prevalent in the prognostics of diseases.To improve the prediction outcome,the study combined the concepts of fuzzy sets and instant case K.When Disease Prediction Support System (DPSS) assists in maintaining a significant data security,social security administration remains a major problem.DPSS was upgraded as Privacy Aware Disease Prediction Support System(PDPSS)by encrypting the homogeneous filler to secure personal sensitive data from illegal users.Din et al.[19]introduced IoT for ML in healthcare domain.ML is the most advanced technology these days which has gained the interests of several researchers and businesses and has experienced a rapid growth.The goal of ML technique is to generate an inevitable connection with remote areas.In fact,ML of IoT depends upon self-sufficient networks that connect several gadgets with no human interaction.

    Gupta et al.[20]proposed a common prediction model for heart disease in cloud computing.The previous challenges faced in medical diagnostics,especially,heart disease prediction can be resolved by ML and CC methods.The study determined a set of approaches to recommend a suitable method that can assist physicians in predicting heart disease based on the personal data of individuals.Liu et al.[21]presented a cloud healthcare system framework for Digital Twin Health(CloudDTH).The idea of Digital Twin Health(DTH)was deliberated and upgraded the DTH method.Amin et al.[22]proposed a significant data mining method that can enhance the prediction accuracy of Cardiovascular Diseases(CVD).These prediction methods are created by utilizing seven factors as alternate classification packages.Ali et al.[23]developed an IoT-based system for oncology domain.This system is utilized to efficiently test a person’s physical conditions for displaying the thinness of apparent medicine and foods.

    3 The Proposed Model

    All the processes included in the proposed OPPDL-DD method are exhibited in Fig.1.As per the figure,IoMT devices gather medical data,preprocess it,and effectively organize it with the help of Radix tree.Followed by,EIG-RSO algorithm is applied to encrypt the data for achieving privacy during data transmission and storage.Lastly,HGRU-CNN-based diagnostic process is executed to determine the presence of disease.

    Figure 1:Working process of OPPDL-DD model

    3.1 Radix Tree Structure

    Once the input medical data is gathered and preprocessed,radix tree is applied owing to its easier mechanism.It is a memory-oriented optimized trie in which every individual node has a child and is interconnected with two nodes.As a result,each interior node holds a minimum of two child nodes.On the contrary to traditional trie,the labeling of edges is done through succeeding and lonely characters.Fig.2 illustrates the structure of Radix tree.It generates a compact set,particularly in case of longsized strings.In radix tree,the height of the tree is mainly based on key length which does not defines the components that exist in the tree.It requires zero rebalancing function whereas every insertion order leads to an identical tree[24].The keys are stored in a lexicographic pattern.The route,from the leaves,represents their keys.So,the keys are stored internally and can be decrypted from the routes.A pair of nodes is available in radix tree and are named after inner and leaf nodes.The inner node is represented by an array of 2 s pointers.Upon traversing,asbit part of the key can be used as an index to the array.Consequently,the subsequent child node can be identified without any extra comparison.The parameterscan be named as the span utilized to analyze the outcomes of radix tree identified by tree height.The level count of intrinsic nodes,available to storek-bit keys,are represented herewith.

    The radix trie saveskbit keys withk/slevels of interior nodes.

    Figure 2:Structure of radix tree

    3.2 Encryption Using EIG-RSO Algorithm

    At this stage,the healthcare information is encrypted utilizing EIG-RSO algorithm to safeguard the data during transmission and storage.The presented EIG technique is defined on the basis of discrete logarithmic problem which is complex for a finite field.It encompasses three processes such as key generation,encryption,and decryption.Primarily,the generation of keys plays a vital part in this cryptosystem as it affects the outcome of complete model.Besides,it is an asymmetric key encryption technique that makes use of Diffie-Hellman key exchange algorithm.It comprises of a private keywith its corresponding public key beingmodqi.Here,gi′denotes the generator forGi1with prime orderqi′.In this paper,EIG algorithm is optimized with the help of ROS algorithm during private key generation process.It resulted in the optimal generation of keys and a considerable increase in security.

    For optimal private key generation,RSO algorithm is employed.Rats are medium-sized longtail rodents that are classified based on its weight and size.It consists of two major classes such as brown and black rats.In rat’s family,male rats are called‘bucks’while the female rats are called‘does’.They have a common behaviour in nature i.e.,socially smart.It grooms itself and gets involved in various events like chasing,tumbling,boxing,and jumping.Rats are territorial animals and exist as a collection of females and males[25].Rats are highly aggressive at most of the instances which result in the death of group members.This aggressive nature remains a major stimulation of this task when fighting and chasing the prey.In this study,both fighting and chasing nature of the rats are considered for mathematical models to implement RSO technique and execute optimization.This section defines the nature of rats in terms of fighting and chasing.

    3.2.1 Chasing the Prey

    Commonly,rats are social animals that chase the prey in a set due to their social agonistic nature.To determine the mathematical nature of rats,optimum search agent is considered which has an understanding about the position of the prey.Another search agent can upgrade their location in line with the location accomplished by optimum searching agent.The subsequent formula expresses the condition.

    where,x=0,1,2,···,MaxIteration

    Thus,RandCdenote the arbitrary values between[0,2],and[1,5]similarly.The variables such asAandCare accountable for high exploitation and exploration on iteration.

    3.2.2 Fighting with Prey

    The mathematical fighting procedure of rats with prey can be defined as given herewith.

    1.Initiate rat populationPiin whichi=1,2,...,n.

    2.Choose the primary variables of RSO i.e.,A,C,andR.

    3.Estimate the fitness values of all searching agents.

    4.Examine the optimum searching agent in the provided searching space.

    5.Upgrade the positions of searching agent by utilizing Eq.(5).

    6.Validate whether all the search agents exceed the boundaries of searching space after which modify it.

    7.Again,estimate the upgraded searching agent fitness values and vectorPr,when there exists an optimum solution compared to prior optimum solution.

    8.End the method after the ending conditions are fulfilled.Or else,proceed to Step 5.

    9.Return the attained optimum and best solutions.

    Figure 3:Flowchart of RSO algorithm

    3.3 HGRU-CNN Based Disease Diagnosis Process

    During disease diagnosis process,HGRU-CNN model is implemented to determine the optimal class label of the employed medical data.

    GRU is a variation of Long Short Term Memory (LSTM) with a gated RNN framework and comparative LSTM.It consists of two gates such as reset gate and update gate in GRU and three more gates such as input,output,and forgetting gates in LSTM;simultaneously,GRU have some trained variables compared to LSTM.Thus,GRU converges faster compared to LSTM in training.GRU framework is demonstrated in Fig.4,whereσand tanh denote the activation functions,c〈t-1〉indicates the input of present unit which is also the output of prior unit,c〈t〉represents the output of present unit and is related to the input of following unit.x〈t〉represents the input of trained information,indicates the unit results created by activation function,ΓrandΓudenote update and reset gates,

    correspondingly,and the candidate activationis calculated equally to conventional recurrent unit[26].Here,GRU consists of two gates namely update gate that maintains prior data to the present state;the value ofΓuextents from zero to one,the nearerΓuis to 0,the prior the data it is recollected.The second one is reset gate which is utilized to define either the present state or prior data is to be integrated.The value ofΓrextends fromReject1 to one,when the value ofΓrbecomes smaller,then it ignores the prior data.Based on this scenario,GRU equation is given herewith.

    Figure 4:Structure of GRU

    whereωu,ωr,andωcdenote the trained weight matrices of reset and update gates,and candidate activation,correspondingly whilebu,br,andbcdenote the bias vectors.CNN is a kind of Artificial Neural Network (ANN) that could operate under high dimension data.It is generally employed in video recognition,text categorization,and visual images.The spatiotemporal matrix for this CNN is given herewith.

    wherekdenotes thekthsmart sensor,nindicates thenthtime sequence,andXk(n)denotes the data recorded bykthsmart sensor onntime.In order to extract the feature from spatiotemporal matrix and to process the spatiotemporal matrix,CNN is utilized.

    In order to leverage the best out of GRU method such as operations of medical data and to reap the benefits of CNN method i.e.,handling high dimension data,a hybrid GRU-CNN hybrid NN is used.The architecture of the presented GRU-CNN hybrid model comprises of both CNN and GRU modules[27].The data gathered through IoMT devices acts as the input.CNN method utilizes shared weights and local connection to extract direct local features from medical data and attains efficient depiction by pooling and convolution layers.CNN framework comprises of flattening function and two convolution layers.All the convolution layers consist of pooling and convolution operations.Later,in secondary pooling function,high dimension data is flattened to 1D data,while the output of CNN method is related to Fully Connected(FC)layer.Alternatively,the goal of GRU method is to conquer long-term dependencies.This method can acquire beneficial data in historical information for a long time by memory cell and ineffective data is forgotten by the forget gate.The inputs of GRU method represent the input data;the method has several GRUs,and the outputs of each GRU are related to FC layer.Lastly,the disease diagnosis outcomes are attained by computing the mean values of entire neurons in FC layer.

    4 Experimental Validation

    Fig.5 and Tab.1 shows the results of comparative analysis between the proposed OPPDL-DD approach and existing techniques.

    Figure 5:Results of the analysis of OPPDL-DD methodology under different measures

    Table 1:Comparative analysis results of existing methods and the presented OPPDL-DD model

    A sensitivity analysis was conducted for the proposed OPPDL-DD method and existing techniques in terms of number of instances.For instance,on the applied 2000 instances,OPPDL-DD model achieved a sensitivity of 0.953,whereas the k-nearest neighbor(K-NN),Na?ve Bayes(NB),Support Vector Machine (SVM),Decision Tree (DT),and EEPSOC-ANN models obtained the sensitivity values such as 0.926,0.879,0.832,0.933,and 0.948,respectively.Besides,on the applied 4000 instances,the proposed OPPDL-DD model attained a sensitivity of 0.955,whereas other models such as K-NN,NB,SVM,DT,and EEPSOC-ANN obtained the sensitivity values such as 0.884,0.846,0.824,0.923,and 0.950,respectively.Also,on the applied 6000 instances,the presented OPPDL-DD technique obtained a sensitivity value of 0.932,whereas K-NN,NB,SVM,DT,and EEPSOC-ANN models reached 0.884,0.864,0.839,0.936,and 0.956 sensitivity values correspondingly.Additionally,on the applied 8000 instances,the proposed OPPDL-DD system achieved a sensitivity of 0.983,whereas KNN,NB,SVM,DT,and EEPSOC-ANN models obtained the following sensitivity values;0.924,0.886,0.824,0.969,and 0.972,respectively.Furthermore,on the applied 10000 instances,OPPDLDD technique attained a sensitivity of 0.988,whereas other techniques such as K-NN,NB,SVM,DT,and EEPSOC-ANN obtained the following sensitivity values namely,0.936,0.891,0.842,0.960,and 0.979.

    The authors conducted the specificity analysis for both the proposed OPPDL-DD method and the existing approaches in terms of number of instances.For instance,on the applied 2000 instances,the proposed OPPDL-DD approach achieved a specificity of 0.941,whereas K-NN,NB,SVM,DT,and EEPSOC-ANN models obtained the specificity values namely,0.842,0.834,0.802,0.926,and 0.943.Additionally,on the applied 6000 instances,OPPDL-DD system accomplished a specificity of 0.950,where K-NN,NB,SVM,DT,and EEPSOC-ANN techniques reached the specificity values namely,0.873,0.869,0.834,0.924,and 0.949,respectively.Likewise,on the applied 10000 instances,the proposed OPPDL-DD model obtained a specificity of 0.936,whereas K-NN,NB,SVM,DT,and EEPSOC-ANN models obtained the specificity values such as 0.893,0.864,0.843,0.904,and 0.924 correspondingly.

    Accuracy analysis was conducted for OPPDL-DD model and other existing methods in terms of number of instances.For example,on the applied 2000 samples,the proposed OPPDL-DD technology attained an accuracy of 0.944,whereas K-NN,NB,SVM,DT,and EEPSOC-ANN approaches reached the accuracy values such as 0.894,0.768,0.734,0.916,and 0.935,respectively.Similarly,on the applied 6000 instances,OPPDL-DD model reached an accuracy of 0.943,whereas other approaches such as K-NN,NB,SVM,DT,and EEPSOC-ANN obtained the following accuracy values like 0.876,0.778,0.756,0.904,and 0.935 correspondingly.Likewise,on the applied 10000 instances,OPPDLDD system accomplished an accuracy of 0.952,while K-NN,NB,SVM,DT,and EEPSOC-ANN methodologies obtained the accuracy values such as 0.893,0.824,0.816,0.928,and 0.942,respectively.

    F-score analysis was conducted for OPPDL-DD against current approaches under different number of instances.For instance,on the employed 2000 instances,the proposed OPPDL-DD methodology attained an F-score of 0.985,whereas K-NN,NB,SVM,DT,and EEPSOC-ANN techniques obtained the following F-scores such as 0.924,0.856,0.812,0.976,and 0.981,respectively.At last,on the applied 6000 instances,the presented OPPDL-DD approach obtained an F-score of 0.956,whereas K-NN,NB,SVM,DT,and EEPSOC-ANN methods attained the F-scores such as 0.924,0.872,0.864,0.932,and 0.947,respectively.Followed by,on the applied 10000 instances,OPPDL-DD technique achieved an F-score value of 0.961,whereas other approaches such as K-NN,NB,SVM,DT,and EEPSOC-ANN reached F-scores namely,0.909,0.837,0.819,0.933,and 0.952.

    Tab.2 and Fig.6 shows the key sens.analysis results accomplished by EIG-RSO algorithm and existing techniques.From the figure,it can be stated that EIG-RSO algorithm accomplished the optimal results for key sens.analysis.For instance,under the presence of 10%,EIG-RSO algorithm achieved an effective key sensitivity of 0.016,where Genetic Algorithm(GA)method,CM-LA model,Lion Algorithm (LA) process,Cuckoo Search (CS) algorithm,Firefly (FF) system,and Particle Swarm Optimization (PSO) techniques achieved poor key sens.values namely,0.053,0.038,0.256,0.041,0.038,and 0.017.Moreover,under the presence of 20%,EIG-RSO model demonstrated an effective key sens.of 0.010,while other methods such as GA,CM-LA,LA,CS algorithm,FF and PSO accomplished poor key sens.values such as 0.051,0.041,0.270,0.068,0.026,and 0.011,correspondingly.Furthermore,under the presence of 40%,EIG-RSO methodology depicted an effective key sens.of -0.030,while GA method,CM-LA model,LA process,CS algorithm,FF system,and PSO techniques achieved poor key sens.values such as 0.043,-0.017,0.173,0.176,0.012,and 0.009,respectively.Besides,under the presence of 60%,the EIG-RSO technique exhibited an effective key sens.of 0.009,while GA method,CM-LA approach,LA,CS process,FF model,and PSO techniques achieved poor key sens.values namely,0.017,0.010,0.124,0.156,0.097,and 0.018,respectively.Additionally,under the presence of 80%,EIG-RSO approach outperformed other methods and achieved an effective key sens.of-0.045,while GA method,CM-LA model,LA process,CS algorithm,FF system,and PSO techniques accomplished poor key sens.values namely,0.068,-0.036,0.074,0.232,0.017,and 0.077.

    Table 2:Key sensitivity analysis results with developed EIG-RSO models

    Figure 6:Key sensitivity analysis results of EIG-RSO models

    Lastly,under the presence of 100%,EIG-RSO algorithm portrayed an effective key sensitivity of-0.008,whereas GA,CM-LA,LA,CS,FF,and PSO systems exhibited poor key sensitivity values namely,0.071,-0.004,0.061,0.232,0.052,and 0.043.

    Figs.7 and 8 depict the results from KPA and CPA analysis achieved by EIG-RSO algorithm against existing techniques.From the attained outcomes,it is apparent that EIG-RSO algorithm obtained KPA and CPA values such as -0.09868 and -0.04994 respectively.Simultaneously,PSO system gained inferior KPA and CPA results such as 0.091679 and 0.089142,respectively.Besides,other methodologies namely FF,CS,LA,GA,and CM-LA models too exhibited moderate results.From the abovementioned analysis and discussion,it is apparent that the developed model achieved excellent privacy and produced an effective disease diagnosis outcome.

    Figure 7:KPA analysis results of EIG-RSO approach with recent methodologies

    Figure 8:CPA analysis of EIG-RSO with recent methodologies

    5 Conclusion

    The current research paper has presented an effective OPPDL-DD method for privacy preserving and disease diagnosis in IoMT environment.Primarily,IoMT devices gather medical data which is effectively organized with the help of Radix tree.The application of Radix Tree helps in reducing the computational complexity during diagnosis.Followed by,EIG-RSO algorithm is applied to encrypt the data and achieve privacy during data transmission and storage.Lastly,HGRU-CNN based diagnostic process is executed to determine the existence of disease.The results from a comprehensive experimental investigation proved the superiority of the proposed OPPDL-DD model on benchmark dataset.The stimulation outcome establishes that the proposed methodology is superior to existing models under various measures.In future,the developed OPPDL-DD models can be extended for real time hardware implementation.

    Funding Statement:This work was supported by Basic Science Research Program through the National Research Foundation of Korea(NRF)funded by the Ministry of Education(2020R1A6A1A03038540)and National Research Foundation of Korea (NRF) grant funded by the Korea government,Ministry of Science and ICT (MSIT) (2021R1F1A1046339) and by a grant (20212020900150) from“Development and Demonstration of Technology for Customers Bigdata-based Energy Management in the Field of Heat Supply Chain”funded by Ministry of Trade,Industry and Energy of Korean government.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    欧美xxⅹ黑人| 下体分泌物呈黄色| 国产熟女欧美一区二区| 欧美变态另类bdsm刘玥| 精品视频人人做人人爽| 亚洲av成人精品一区久久| 丝瓜视频免费看黄片| 欧美日韩国产mv在线观看视频| 18禁在线播放成人免费| 中文字幕av电影在线播放| 少妇裸体淫交视频免费看高清| 成人影院久久| 一边亲一边摸免费视频| 少妇的逼好多水| 多毛熟女@视频| 久久精品国产自在天天线| 国产一区二区三区av在线| 日韩伦理黄色片| 免费播放大片免费观看视频在线观看| 3wmmmm亚洲av在线观看| 99热网站在线观看| 99久久精品热视频| 日韩三级伦理在线观看| 国产国拍精品亚洲av在线观看| 国产成人精品婷婷| 中文精品一卡2卡3卡4更新| 精品午夜福利在线看| 午夜久久久在线观看| 夫妻午夜视频| 18禁在线播放成人免费| 中文字幕av电影在线播放| 丰满少妇做爰视频| 久久国内精品自在自线图片| 久久国内精品自在自线图片| 亚洲国产色片| 99热全是精品| 91精品国产九色| av黄色大香蕉| 在线观看人妻少妇| 成人综合一区亚洲| 国产又色又爽无遮挡免| 97超碰精品成人国产| 亚洲精华国产精华液的使用体验| 精品少妇黑人巨大在线播放| 国产欧美亚洲国产| 久久人妻熟女aⅴ| 一级毛片黄色毛片免费观看视频| 日韩欧美 国产精品| 日日啪夜夜撸| 欧美日韩视频精品一区| av免费观看日本| 色婷婷av一区二区三区视频| 成人国产麻豆网| 99久久精品热视频| 国产一区亚洲一区在线观看| 伦理电影免费视频| 人人澡人人妻人| 免费观看无遮挡的男女| 亚洲成人手机| 亚洲av免费高清在线观看| 国产精品久久久久久精品电影小说| 亚洲av不卡在线观看| 国产日韩欧美亚洲二区| 观看免费一级毛片| 国产欧美日韩精品一区二区| 精品少妇黑人巨大在线播放| 国产免费福利视频在线观看| 国产真实伦视频高清在线观看| 国产极品粉嫩免费观看在线 | 另类精品久久| 久久精品国产a三级三级三级| 国产淫语在线视频| 午夜免费男女啪啪视频观看| 亚洲经典国产精华液单| 亚洲欧美一区二区三区黑人 | www.色视频.com| 一级片'在线观看视频| 久久综合国产亚洲精品| 91久久精品国产一区二区成人| 18禁在线无遮挡免费观看视频| 麻豆成人午夜福利视频| 三级国产精品片| 国产欧美日韩一区二区三区在线 | 午夜免费观看性视频| a级一级毛片免费在线观看| 亚洲久久久国产精品| 国产男女超爽视频在线观看| 91久久精品电影网| 成人黄色视频免费在线看| 女人精品久久久久毛片| √禁漫天堂资源中文www| 18禁在线播放成人免费| 18禁在线无遮挡免费观看视频| 欧美精品亚洲一区二区| 精品99又大又爽又粗少妇毛片| 亚洲三级黄色毛片| 少妇的逼水好多| 国产精品一区二区在线观看99| 伊人亚洲综合成人网| 高清黄色对白视频在线免费看 | 韩国高清视频一区二区三区| 欧美 日韩 精品 国产| 日日啪夜夜爽| 99久久精品一区二区三区| 伦精品一区二区三区| 老司机影院毛片| 成人毛片a级毛片在线播放| 男人狂女人下面高潮的视频| 国产免费视频播放在线视频| 夜夜骑夜夜射夜夜干| 一级av片app| 国产高清三级在线| 国产一区二区三区综合在线观看 | 婷婷色av中文字幕| 国产日韩欧美亚洲二区| 人人妻人人看人人澡| 国产白丝娇喘喷水9色精品| 日韩av在线免费看完整版不卡| 亚洲国产精品专区欧美| 精品久久国产蜜桃| 91久久精品国产一区二区成人| 亚洲av免费高清在线观看| 嘟嘟电影网在线观看| 精品亚洲成a人片在线观看| 国产伦精品一区二区三区四那| 亚洲欧美日韩东京热| 男女边摸边吃奶| 美女国产视频在线观看| 亚洲情色 制服丝袜| 人妻人人澡人人爽人人| 国产精品一二三区在线看| videos熟女内射| 尾随美女入室| 成人免费观看视频高清| 国产永久视频网站| 精品久久久久久电影网| 国产高清国产精品国产三级| 热re99久久国产66热| 黄色视频在线播放观看不卡| 丝瓜视频免费看黄片| 少妇被粗大的猛进出69影院 | 国产日韩一区二区三区精品不卡 | 亚洲精品国产色婷婷电影| 久久6这里有精品| 国产精品99久久99久久久不卡 | 99久久综合免费| 免费在线观看成人毛片| 亚洲国产成人一精品久久久| 夜夜爽夜夜爽视频| 亚洲中文av在线| 久久久久久久久久久久大奶| 国产成人免费观看mmmm| 国产高清有码在线观看视频| 熟女人妻精品中文字幕| 国产爽快片一区二区三区| 亚洲精品一二三| 亚洲av欧美aⅴ国产| 国产极品粉嫩免费观看在线 | 亚洲精品日韩av片在线观看| 97在线视频观看| 一本大道久久a久久精品| 国产乱来视频区| 在线观看免费视频网站a站| .国产精品久久| 亚洲欧美精品专区久久| 精品久久久久久久久av| av国产久精品久网站免费入址| 99热这里只有是精品在线观看| 国产免费又黄又爽又色| 国产精品一区二区在线观看99| 婷婷色麻豆天堂久久| 国产成人精品婷婷| 日韩欧美精品免费久久| 午夜精品国产一区二区电影| 精品一品国产午夜福利视频| 黄色日韩在线| 亚洲熟女精品中文字幕| 亚洲欧洲精品一区二区精品久久久 | 我的女老师完整版在线观看| 久久99热这里只频精品6学生| 亚洲人与动物交配视频| 国产乱人偷精品视频| 免费看不卡的av| 精品酒店卫生间| freevideosex欧美| 美女主播在线视频| a级毛片免费高清观看在线播放| 人妻人人澡人人爽人人| 国产精品蜜桃在线观看| 国产精品人妻久久久久久| 国产熟女欧美一区二区| 一区在线观看完整版| 日韩强制内射视频| 亚洲综合精品二区| 免费看av在线观看网站| 日韩视频在线欧美| 熟女电影av网| 人人妻人人澡人人看| 一本—道久久a久久精品蜜桃钙片| 少妇猛男粗大的猛烈进出视频| 麻豆乱淫一区二区| 成人综合一区亚洲| 精品国产露脸久久av麻豆| 最黄视频免费看| 9色porny在线观看| 曰老女人黄片| 精品久久久噜噜| 欧美日韩综合久久久久久| 成人黄色视频免费在线看| 国产精品免费大片| 在现免费观看毛片| 欧美成人午夜免费资源| 九九在线视频观看精品| 亚洲精品日韩在线中文字幕| 国产一区亚洲一区在线观看| 国产成人a∨麻豆精品| 美女视频免费永久观看网站| 97超碰精品成人国产| 你懂的网址亚洲精品在线观看| 亚洲一区二区三区欧美精品| 大片电影免费在线观看免费| 国产精品久久久久成人av| 乱人伦中国视频| 成人免费观看视频高清| 日韩中字成人| 国产高清国产精品国产三级| 狂野欧美激情性bbbbbb| 少妇熟女欧美另类| 国产成人精品一,二区| 亚洲经典国产精华液单| 日本午夜av视频| 我要看日韩黄色一级片| 下体分泌物呈黄色| av黄色大香蕉| 色网站视频免费| 看非洲黑人一级黄片| 亚洲情色 制服丝袜| 欧美xxxx性猛交bbbb| 久久久久久久亚洲中文字幕| 人体艺术视频欧美日本| 九九久久精品国产亚洲av麻豆| 偷拍熟女少妇极品色| 黄色视频在线播放观看不卡| 国产成人精品一,二区| 夜夜看夜夜爽夜夜摸| 日日撸夜夜添| 日日摸夜夜添夜夜爱| 国产 精品1| 成年女人在线观看亚洲视频| 你懂的网址亚洲精品在线观看| 久久久久久伊人网av| 国语对白做爰xxxⅹ性视频网站| 国产爽快片一区二区三区| 99国产精品免费福利视频| 日产精品乱码卡一卡2卡三| 欧美精品国产亚洲| 国产片特级美女逼逼视频| 青春草视频在线免费观看| 免费观看av网站的网址| 色吧在线观看| av国产久精品久网站免费入址| 丝瓜视频免费看黄片| 欧美最新免费一区二区三区| 精品一区二区免费观看| 99九九在线精品视频 | 亚洲精品aⅴ在线观看| 国产精品国产三级国产av玫瑰| 18禁在线无遮挡免费观看视频| 国产一级毛片在线| 在线播放无遮挡| 自拍偷自拍亚洲精品老妇| 久久久久久久精品精品| 在线观看www视频免费| 麻豆成人av视频| 天天躁夜夜躁狠狠久久av| 久久国产乱子免费精品| 亚洲精品久久午夜乱码| 六月丁香七月| 国产爽快片一区二区三区| 九九在线视频观看精品| av又黄又爽大尺度在线免费看| 精品人妻熟女av久视频| 日日摸夜夜添夜夜添av毛片| 久久99蜜桃精品久久| 狂野欧美激情性xxxx在线观看| 久久久久网色| 日韩一区二区视频免费看| 91午夜精品亚洲一区二区三区| 国产高清国产精品国产三级| 亚洲av综合色区一区| 色94色欧美一区二区| 少妇人妻久久综合中文| 日韩免费高清中文字幕av| 成人美女网站在线观看视频| 国产黄频视频在线观看| 日本av手机在线免费观看| 多毛熟女@视频| 97在线视频观看| 日本爱情动作片www.在线观看| 美女内射精品一级片tv| 少妇熟女欧美另类| 人妻一区二区av| 最新中文字幕久久久久| 高清不卡的av网站| 亚洲精品国产av蜜桃| 国产一区二区三区综合在线观看 | a级毛片免费高清观看在线播放| 国产成人aa在线观看| 高清毛片免费看| 免费大片黄手机在线观看| 欧美日韩在线观看h| 黄色毛片三级朝国网站 | 美女大奶头黄色视频| 精品久久国产蜜桃| 亚洲综合精品二区| 在线观看免费视频网站a站| av网站免费在线观看视频| 丰满乱子伦码专区| 一级黄片播放器| kizo精华| 久久久午夜欧美精品| av一本久久久久| 国产成人aa在线观看| 日日摸夜夜添夜夜添av毛片| 哪个播放器可以免费观看大片| 亚洲精华国产精华液的使用体验| 国内少妇人妻偷人精品xxx网站| 男女国产视频网站| 免费在线观看成人毛片| 熟女av电影| 黄片无遮挡物在线观看| 久久国产亚洲av麻豆专区| 中文在线观看免费www的网站| 高清黄色对白视频在线免费看 | 午夜精品国产一区二区电影| 大香蕉久久网| 亚洲av福利一区| 韩国高清视频一区二区三区| 精品少妇黑人巨大在线播放| 欧美bdsm另类| 精品久久久精品久久久| 国产高清三级在线| 日韩一本色道免费dvd| 中国国产av一级| 亚洲精品国产av蜜桃| 插逼视频在线观看| 大片电影免费在线观看免费| 韩国av在线不卡| 国产探花极品一区二区| 日韩伦理黄色片| 亚洲精品日本国产第一区| 18+在线观看网站| 国产精品国产三级国产av玫瑰| 婷婷色av中文字幕| 夜夜看夜夜爽夜夜摸| 久久99热这里只频精品6学生| 男女无遮挡免费网站观看| 日韩中字成人| 国产美女午夜福利| 精品国产一区二区三区久久久樱花| 一级片'在线观看视频| 久久人人爽人人片av| 欧美+日韩+精品| 日本午夜av视频| 国产免费视频播放在线视频| av线在线观看网站| 美女脱内裤让男人舔精品视频| 女人精品久久久久毛片| 国产精品一区二区在线不卡| 精品卡一卡二卡四卡免费| 亚洲精品成人av观看孕妇| av线在线观看网站| 欧美高清成人免费视频www| 国产精品一区二区性色av| 婷婷色综合大香蕉| 亚洲国产av新网站| 亚洲欧洲日产国产| 校园人妻丝袜中文字幕| 亚洲va在线va天堂va国产| 国产69精品久久久久777片| 免费少妇av软件| 女性生殖器流出的白浆| .国产精品久久| 国产精品偷伦视频观看了| 国产亚洲91精品色在线| 久久6这里有精品| 99久国产av精品国产电影| 乱人伦中国视频| 国产成人精品无人区| 欧美性感艳星| 亚洲国产精品国产精品| 永久免费av网站大全| 校园人妻丝袜中文字幕| 九九爱精品视频在线观看| 欧美精品人与动牲交sv欧美| √禁漫天堂资源中文www| 美女视频免费永久观看网站| 交换朋友夫妻互换小说| 久久97久久精品| 日韩一区二区视频免费看| 精品国产乱码久久久久久小说| 亚洲国产精品成人久久小说| 成年人免费黄色播放视频 | 免费观看无遮挡的男女| 精品久久久噜噜| 国产亚洲5aaaaa淫片| 国产免费一区二区三区四区乱码| 午夜视频国产福利| 欧美bdsm另类| 狂野欧美白嫩少妇大欣赏| 九九在线视频观看精品| 一区二区av电影网| 午夜激情福利司机影院| 九九在线视频观看精品| 免费观看无遮挡的男女| 国产成人午夜福利电影在线观看| 一级毛片 在线播放| 欧美xxxx性猛交bbbb| 熟女电影av网| 精品少妇久久久久久888优播| 免费人成在线观看视频色| 国内揄拍国产精品人妻在线| 久久久久网色| 欧美最新免费一区二区三区| 久久人人爽av亚洲精品天堂| 亚洲三级黄色毛片| 日韩不卡一区二区三区视频在线| 国内精品宾馆在线| 性高湖久久久久久久久免费观看| 国国产精品蜜臀av免费| 高清毛片免费看| 这个男人来自地球电影免费观看 | 深夜a级毛片| 下体分泌物呈黄色| 久久鲁丝午夜福利片| 有码 亚洲区| 十八禁高潮呻吟视频 | 丰满饥渴人妻一区二区三| 中文字幕人妻丝袜制服| 综合色丁香网| 免费人成在线观看视频色| 一区二区av电影网| 天堂俺去俺来也www色官网| 中文天堂在线官网| 亚洲高清免费不卡视频| 欧美人与善性xxx| 国产高清国产精品国产三级| 国产色婷婷99| 亚洲美女视频黄频| 啦啦啦啦在线视频资源| 中文天堂在线官网| 人妻人人澡人人爽人人| 久久亚洲国产成人精品v| 色哟哟·www| 丝袜喷水一区| 日本与韩国留学比较| 黄色视频在线播放观看不卡| 国产精品久久久久久久电影| 国产黄片视频在线免费观看| 日韩欧美一区视频在线观看 | 熟妇人妻不卡中文字幕| 男女边摸边吃奶| 女性被躁到高潮视频| 色网站视频免费| 嫩草影院新地址| 久久久欧美国产精品| 亚洲精品成人av观看孕妇| 亚洲色图综合在线观看| 欧美xxxx性猛交bbbb| 乱人伦中国视频| 看免费成人av毛片| 国产一区二区三区av在线| 久久午夜综合久久蜜桃| 春色校园在线视频观看| 亚洲人与动物交配视频| 亚洲av日韩在线播放| 2021少妇久久久久久久久久久| 久久久久久久久久成人| 亚洲欧洲日产国产| 国产精品麻豆人妻色哟哟久久| 日本wwww免费看| 亚洲精品456在线播放app| 只有这里有精品99| 水蜜桃什么品种好| 天堂中文最新版在线下载| 丰满少妇做爰视频| 国产黄片美女视频| 天堂8中文在线网| 国产精品国产av在线观看| 又粗又硬又长又爽又黄的视频| 涩涩av久久男人的天堂| 日韩不卡一区二区三区视频在线| 欧美 日韩 精品 国产| 日本午夜av视频| 特大巨黑吊av在线直播| 国产熟女午夜一区二区三区 | 在线亚洲精品国产二区图片欧美 | 人人妻人人澡人人看| 欧美成人精品欧美一级黄| 久久久亚洲精品成人影院| 夜夜骑夜夜射夜夜干| 99视频精品全部免费 在线| av卡一久久| 国产在线免费精品| 91在线精品国自产拍蜜月| 十八禁网站网址无遮挡 | 内射极品少妇av片p| 青春草亚洲视频在线观看| 少妇被粗大的猛进出69影院 | 伊人久久国产一区二区| 精品国产一区二区久久| 高清毛片免费看| 婷婷色综合大香蕉| 欧美成人精品欧美一级黄| 日本av免费视频播放| 免费看av在线观看网站| 国产一区二区三区av在线| 丝袜在线中文字幕| 国产亚洲一区二区精品| freevideosex欧美| 中文乱码字字幕精品一区二区三区| 午夜福利在线观看免费完整高清在| 丰满少妇做爰视频| 夫妻性生交免费视频一级片| 18禁在线无遮挡免费观看视频| 插逼视频在线观看| 欧美 亚洲 国产 日韩一| 亚洲电影在线观看av| 亚洲国产最新在线播放| 一级毛片黄色毛片免费观看视频| 国产极品粉嫩免费观看在线 | 国产伦在线观看视频一区| 欧美日韩视频高清一区二区三区二| 日韩,欧美,国产一区二区三区| 久久久久久久精品精品| av有码第一页| 卡戴珊不雅视频在线播放| 最近中文字幕2019免费版| 美女内射精品一级片tv| 制服丝袜香蕉在线| 51国产日韩欧美| 欧美精品一区二区免费开放| 啦啦啦啦在线视频资源| 久久精品久久久久久噜噜老黄| 国产乱人偷精品视频| av在线观看视频网站免费| 日本黄色片子视频| 欧美日韩在线观看h| 性色av一级| 日本av免费视频播放| 精品99又大又爽又粗少妇毛片| 国产精品国产三级国产av玫瑰| 一级毛片aaaaaa免费看小| 国产国拍精品亚洲av在线观看| 蜜桃在线观看..| 亚洲色图综合在线观看| 性高湖久久久久久久久免费观看| 免费观看的影片在线观看| 久久热精品热| 欧美日韩亚洲高清精品| 国产精品人妻久久久影院| 精品一品国产午夜福利视频| 多毛熟女@视频| 蜜桃在线观看..| 午夜福利视频精品| 中文字幕人妻丝袜制服| 一本一本综合久久| 亚洲精品自拍成人| 丰满饥渴人妻一区二区三| 亚洲熟女精品中文字幕| 久久久久人妻精品一区果冻| 99热这里只有是精品在线观看| 免费人妻精品一区二区三区视频| 麻豆精品久久久久久蜜桃| 精华霜和精华液先用哪个| 99热这里只有精品一区| 国产欧美日韩综合在线一区二区 | 人人妻人人看人人澡| 国产精品女同一区二区软件| 日本黄色日本黄色录像| 男男h啪啪无遮挡| 在线天堂最新版资源| av女优亚洲男人天堂| 日韩一本色道免费dvd| 热re99久久精品国产66热6| 最新中文字幕久久久久| 观看免费一级毛片| 亚洲欧洲日产国产| 欧美变态另类bdsm刘玥| 国产黄片视频在线免费观看| 亚洲经典国产精华液单| 免费观看的影片在线观看| 国产免费一级a男人的天堂| 免费在线观看成人毛片| 亚洲熟女精品中文字幕| 欧美成人午夜免费资源| 国产欧美另类精品又又久久亚洲欧美| 男人添女人高潮全过程视频| 搡老乐熟女国产| 国产在线免费精品| 日韩免费高清中文字幕av| 欧美精品一区二区大全| 天堂俺去俺来也www色官网| 亚洲欧美成人综合另类久久久| 观看免费一级毛片| 久久久精品94久久精品| 日韩,欧美,国产一区二区三区| 亚洲精品国产av成人精品| 男女啪啪激烈高潮av片| 亚洲国产欧美日韩在线播放 | 亚洲国产精品国产精品| 中文精品一卡2卡3卡4更新| 国产午夜精品一二区理论片| 久久精品久久精品一区二区三区| 中文字幕人妻丝袜制服|