Data Mining in Clinical Decision Support Systems for Diagnosis, Prediction and Treatment of Heart Disease
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2013, Vol 2, Issue 1
Abstract
Medical errors are both costly and harmful. Medical errors cause thousands of deaths worldwide each year. A clinical decision support system (CDSS) offers opportunities to reduce medical errors as well as to improve patient safety. One of the most important applications of such systems is in diagnosis and treatment of heart diseases (HD) because statistics have shown that heart disease is one of the leading causes of deaths all over the world. Data mining techniques have been very effective in designing clinical support systems because o f its ability discover hidden patterns and relationships in medical data. This paper compares the performance and working of six CDSS systems which use different data mining techniques for heart disease prediction and diagnosis. This paper also finds out that there is no system to identify treatment options for HD patients.
Authors and Affiliations
Syed Umar Amin , Kavita Agarwal , Dr. Rizwan Beg,
XML Query Answering using Tree based Association Rules
Mainly two approaches are used to access XML document: keyword-based search and query-answering. The first one comes from the tradition of information retrieval. Where most searches are performed on the textual con...
Implementation of Radix-4 Multiplier with a Parallel MAC unit using MBE Algorithm
t— A radix-4/-8 multiplier is implemented using modified booth multiplier encoder that demand high speed and low energy operation. Depending on the input pattern, the multiplier operates in the radix-8 mode in 56%...
STUDY OF QUANTUM CRYPTOGRAPHY
t-The concept of quantum cryptography involves the quantum physics by which two parties can establish a secure key exchange. The security in such system is defined by the laws of quantum physics. Quantum cryptography...
Egoistic superimpose Network Formation and Preservation
t—A introductory issue essential many superimpose network applications ranging from routing to peer-to-peer file distribution is that of the network configuration, i.e., flop new arrivals into an presented overlie,...
A Survey on Preserving Privacy towards Location Proof
Location proof of a particular person relies on his/her mobile device position. One of the valuable features of the location proofs tells about accessing the location based services (LBS) by using mobile device. Lo...