Authors:
Muhammad Anas,Muhammad Atif Imtiaz,Saad Khan,Arshad Ali,Noor Fatima Naghman,Hamayun Khan,Sami Albouq,DOI NO:
https://doi.org/10.26782/jmcms.2025.03.00005Keywords:
Artificial Intelligence,Data Preprocessing,Machine Learning,Logistic Regression,Neural Networks,Neural Networks,Random Forest,SVM,Abstract
Cardiovascular diseases (CD) are the common cause of death worldwide over in developed as well as underdeveloped and developing countries. Early detection and continuous supervision can reduce the mortality rate. Cardiovascular disease diagnosis and accurate diagnosis to enable early treatment. Some of these techniques do not easily diagnose heart diseases at early stages hence, getting treatment late poses a big risk. The present work attempts to better predict this disease from the chest pain symptom, and classify it by designing an efficient machine learning system based on a dataset with 303 patient data made available to the public domain. The four machine learning algorithms that were used for the analysis include Logistic Regression, Random Forest, Support Vector Machines, and Neural Networks to determine which of them is most appropriate for predicting heart diseases. Original data was preprocessed by handling missing values, normalizing features, and using feature extraction techniques. Splitting the dataset into 80% training and 20% testing, cross-validation was performed to validate outcomes on all four models. Although the highest accuracy was reached by the model of the Neural Network by 97%, it was revealed to have tendencies of overfitting. The SVM model achieved the highest accuracy of 97%, and was the most stable and interpretable; therefore, it was considered to be the most suitable for clinical use. Base on the study, there is a promise to champion the use of machine learning models for timely diagnosis of heart diseases by medical practitioners to enhance patient success rates and the overworked health facilities’ performance. The next steps will consist in enlarging a database and implementing these models in supporting clinical practice with real-time diagnostic potential. As a result, the doctors can visualize the patient’s real-time sensor data using the application and start live video streaming if instant medication is required. The proposed system is notified at once through GSM technology.Refference:
I. Aldawood, H., & Skinner, G.. Educating and raising awareness on cyber security social engineering: A literature review. In 2018 IEEE international conference on teaching, assessment, and learning for engineering (TALE), vol 10, no. 5, pp. 62-68. IEEE. 2018, December
II. Al-Hadhrami, Y., & Hussain, F. K. DDoS attacks in IoT networks: a comprehensive systematic literature review. World Wide Web, Vol 24, no 3, pp 971-1001. 2021.
III. Ali, I., Sabir, S., & Ullah, Z. Internet of things security, device authentication and access control: a review. arXiv preprint arXiv: Vol 14, no 2, pp 1901-1920, 2019.
IV. Hassan, H. Khan, I. Uddin, A. Sajid, “Optimal Emerging trends of Deep Learning Technique for Detection based on Convolutional Neural Network”, Bulletin of Business and Economics (BBE), Vol.12, No.4, pp. 264-273, 2023
V. H. Khan, A. Ali, S. Alshmrany, “Energy-Efficient Scheduling Based on Task Migration Policy Using DPM for Homogeneous MPSoCs”, Computers, Materials & Continua, Vol.74, No.1, pp. 965-981, 2023
VI. H. Sarwar, H. Khan, I. Uddin, R. Waleed, S. Tariq, “An Efficient E-Commerce Web Platform Based on Deep Integration of MEAN Stack Technologies”, Bulletin of Business and Economics (BBE), Vol. 12, No.4, pp. 447-453, 2023
VII. Hammad. A , E. Zhao, “Mitigating link insecurities in smart grids via QoS multi-constraint routing“, In 2016 IEEE International Conference on Communications Workshops (ICC)”, pp. 380-386. 2016
VIII. H. Khan, I. Uddin, A. Ali, M. Husain, “An Optimal DPM Based Energy-Aware Task Scheduling for Performance Enhancement in Embedded MPSoC” Computers, Materials & Continua, Vol.74, No.1, pp. 2097-2113, 2023
IX. Hammad, A. A., Ahmed, “Deep Reinforcement Learning for Adaptive Cyber Defense in Network Security”, In Proceedings of the Cognitive Models and Artificial Intelligence Conference, pp. 292-297, 2016
X. H. Khan, M. U. Hashmi, Z. Khan, R. Ahmad, “Offline Earliest Deadline first Scheduling based Technique for Optimization of Energy using STORM in Homogeneous Multi-core Systems,” IJCSNS Int. J. Comput. Sci. Netw. Secur, Vol.18, No.12, pp 125-130, 2018
XI. Hossein Shirazi, Bruhadeshwar. B,”Kn0w Thy Doma1n Name”: Unbiased Phishing Detection Using Domain Name Based Features. In Proceedings Of The 23nd Acm On Symposium On Access Control Models And Technologies (Sacmat ’18). Association For Computing Machinery, New York, Ny, Usa, pp. 69-75, 2018
XII. Hussain, S., Rajput, U. A., Kazi, Q. A., & Mastoi, S, “Numerical investigation of thermohydraulic performance of triple concentric-tube heat exchanger with longitudinal fins”, J. Mech. Cont. & Math. Sci, Vol. 16, No. 8, pp 61-73, 2021.
XIII. H. Khan, S. Ahmad, N. Saleem, M. U. Hashmi, Q. Bashir, “Scheduling Based Dynamic Power Management Technique for offline Optimization of Energy in Multi Core Processors” Int. J. Sci. Eng. Res, Vol.9, No.12, pp 6-10, 2018
XIV. H. Khan, K. Janjua, A. Sikandar, M. W. Qazi, Z. Hameed, “An Efficient Scheduling based cloud computing technique using virtual Machine Resource Allocation for efficient resource utilization of Servers” In 2020 International Conference on Engineering and Emerging Technologies (ICEET), IEEE, pp 1-7, 2020
XV. Hammad, M., Jillani, R. M., Ullah, S., Namoun, A., Tufail, A., Kim, K. H., & Shah, H, “Security framework for network-based manufacturing systems with personalized customization”, An industry 4.0 approach, Sensors, vol. 23. No. 17-55, 2022
XVI. H. Khan, Q. Bashir, M. U. Hashmi, “Scheduling based energy optimization technique in multiprocessor embedded systems” In 2018 International Conference on Engineering and Emerging Technologies (ICEET), IEEE, pp 1-8, 2018. 10.1109/ICEET1.2018.8338643
XVII. H. Khan, A. Yasmeen, S. Jan, U. Hashmi, “Enhanced Resource Leveling Indynamic Power Management Techniqueof Improvement In Performance For Multi-Core Processors”, Journal Of Mechanics Of Continua And Mathematical Sciences, Vol.6, No.14, pp. 956-972, 2019.
XVIII. H. Khan, K. Janjua, A. Sikandar, M. W. Qazi, Z. Hameed, “An Efficient Scheduling based cloud computing technique using virtual Machine Resource Allocation for efficient resource utilization of Servers” In 2020 International Conference on Engineering and Emerging Technologies (ICEET), IEEE, pp 1-7, 2020.
XIX. H. Huang, J. Tan And L. Liu, “Countermeasure Techniques For Deceptive Phishing Attack”, International Conference On New Trends In Information And Service Science, Beijing, pp. 636-641, 2009.
XX. H. Khan, M. U. Hashmi, Z. Khan, R. Ahmad, “Offline Earliest Deadline first Scheduling based Technique for Optimization of Energy using STORM in Homogeneous Multi-core Systems” IJCSNS Int. J. Comput. Sci. Netw. Secur, Vol.18, No.12, pp 125-130, 2018.