ISSN ONLINE(2320-9801) PRINT (2320-9798)

All submissions of the EM system will be redirected to Online Manuscript Submission System. Authors are requested to submit articles directly to Online Manuscript Submission System of respective journal.

Amazing porn model Belle Delphine nudes on Watch free video collection of Belle Delphine nede leaked

Rare Muslim porn and سكس on Tons of Arab porn clips.

XNXX and Xvideos porn clips free on Best XnXX porn tube channels, categorized sex videos, homemade and amateur porn.

Exlusive russian porn Get uniqe porn clips from Russia

Find out on best collection of Arabain and Hijab سكس

Secured Neuro Genetic Approach for Predicting the Risk of Heart Disease

N.G.Bhuvaneswari Amma, K.Malathi, P.Balasubramanian
Faculty, Department of Information Technology, Indian Institute of Information Technology, Srirangam, Tiruchirappalli, Tamilnadu, India
Related article at Pubmed, Scholar Google

Visit for more related articles at International Journal of Innovative Research in Computer and Communication Engineering


Medical diagnosis is done mostly by doctors’ expertise and experience. But in some circumstances, it may lead to wrong diagnosis and treatment. In this paper, a medical diagnosis system is proposed to predict the risk of heart disease using a secured neuro genetic approach. The objective of secured data classification is to build accurate classifiers without disclosing private information in the data being mined. In this paper, the learning capabilities of neural network and the optimization capabilities of genetic algorithms are combined in order to give better classification. To securely compute the activation function ElGamal scheme is used and the data is vertically partitioned. The effectiveness of the classifier is verified by experiments on Cleveland Heart Disease Dataset provided by the University of California, Irvine (UCI) machine learning repository.


Secure computing, neural networks, genetic algorithms, multiparty computation, ElGamal scheme


Heart disease is a class of diseases that involve the heart, the blood vessels or both. The heart is the organ that pumps blood to all tissues of the body. If the pumping action of the heart becomes inefficient, vital organs like the brain and kidney suffer and if the heart stops working, death occurs within minutes. The World Health Organization has estimated that 12 million deaths occur worldwide, every year due to heart disease [2]. Medical diagnosis is an important yet complicated task that needs to be done accurately and efficiently. The automation of this system is very much needed to help the physicians to do better diagnosis and treatment. The representation of medical knowledge, decision making, choice and adaptation of a suitable model are some issues that a medical system should take into consideration. Medical progress is always supported by data analysis which improves the skill of medical experts and establishes the treatment technique for diseases. The purpose of medical diagnosis system is to assist physicians in defining the risk level of an individual patient. The heart disease dataset found in UCI Machine Learning Repository [22] is used for training and testing the system. The purpose of using this dataset is to provide a complex, real world data example where the relationships between the features are not easily discovered by casual inspection.
In medical diagnosis, knowledge that describes the desired system behavior is contained in datasets. When the datasets contain knowledge about the system to be designed, a neural network promises solution, because it can train itself from the datasets. The applicability of neural networks for these applications is motivated by their robustness to noisy data and their ability to determine general patterns in an efficient manner. It is possible to update a trained network by presenting new training data to the network. Using the training data, the neural network builds an internal model that maps the given data to any one of the class. Then the trained network is used to classify new data. The classification quality of the neural network depends on the number of training data. Therefore, the classification performance can be improved by using more training data. Genetic algorithm is an optimization algorithm that mimics the principles of natural genetics. It finds acceptably good solutions to problems acceptably quickly. In this paper, genetic algorithm is used to optimize the weights of the neural network.
In most of the applications, privacy issues come up because their data are considered as sensitive data. As a result, conventional methods for knowledge discovery from data are not appropriate. Therefore, secured data mining methods offer the chance to build models and extract patterns without disclosing private data. Secured data mining methods for knowledge discovery can be categorized into two groups: data perturbation methods and cryptographic methods [8] [9]. Data perturbation methods use data distortions such as adding uniform noise with the purpose of hiding private data. Cryptographic methods are used for collaborative model learning. Two or more parties contribute their data for the learning of a shared model according to security protocols that prevent the disclosure of the contributed data. In this paper, cryptographic method for supervised learning has been proposed and we focus on privacy preservation of genetic based neural network training. The data contributed among the parties are vertically partitioned in the sense that the shared model is built upon the union of the contributed datasets.


A number of approaches have been used to construct a secured classifier. Hai, Hussain, and Xin (2008), in their work proposed neural based learning classifier system for classifying data mining tasks [1]. Fong,Jens [20], applied a privacy preserving approach with the ID3 decision tree learning algorithm and discrete-valued attributes only. They proposed to develop the application scope for algorithms such as C4.5 and C5.0 and data mining methods with mixed discretly and continuously valued attributes. Also they proposed to optimize the storage size of the unrealized samples and the processing time when generating a decision tree from those samples.
Alka Gangrade, Ravindra Patel [20], applied a Privacy Preserving data mining method on the decision tree over horizontally Partitioned data using UTP(Un-trusted Third Party). Anand Sharma and Vibha Ojha[21], applied algorithms like ID3, Gain Ratio, Gini Index are used for constructing a decision tree. Shantakumar and Kumaraswamy (2009), in their work proposed an intelligent and effective heart attack prediction system using data mining and artificial neural network[4][5].
The first Secure Multiparty Computation (SMC) problem was described by Yao [6]. SMC allows parties with minimizing the threat of disclosure was explained [7]. Privacy preserving data mining has been an active research area for a decade. A lot of work is going on by the researcher on privacy preserving classification in distributed data mining. An overview of the new and rapidly emerging research area of privacy preserving data mining, also classify the techniques, review and evaluation of privacy preserving algorithms presented in [8]. Various tools discussed and how they can be used to solve several privacy preserving data mining problem [9]. Cryptographic research on secure distributed computation and their applications to data mining were demonstrated by Pinkas Benny [10]. Algorithm ID3 particularly a well designed and natural solution for classification was first proposed by Quinlan [11]. Lindell and Pinkas proposed a secure algorithm to build a decision tree using ID3 over horizontally partitioned data between two parties using SMC [12]. A generalized privacy preserving variant of the ID3 algorithm for vertically partitioned data distributed over two or more parties introduced in [12]. A decision tree algorithm over vertically partitioned data using secure scalar product protocol proposed in [12].A novel privacy preserving distributed decision tree learning algorithm [14], that is based on Shamir [16] and the ID3 algorithm is scalable in terms of computation and communication cost, and therefore it can be run even when there is a large number of parties involved and eliminate the need for third party and propose a new method without using third parties.
Algorithms on building decision tree, however, the tree on each party doesn’t contain any information that belong to other party [15]. The drawback of this method is that the resulting class can be altered by a malicious party. Privacy preserving decision tree algorithm over vertically partitioned data, which is based on idea of passing control from site to site proposed by Wei Fang and Yang [17]. The main purpose of data classification is to build a model (i.e., classifier) to predict the (categorical) class labels of records based on a training data set where the class label of each record is given. The classifier is usually represented by classification rules, decision trees, neural networks, or mathematical formulae that can be used for classification. The work of Agrawal and Srikant [18] utilized a randomization-based perturbation approach to perturb the data. The data are individually perturbed by adding noise randomly drawn from a known distribution. A decision tree classifier is then learned from the reconstructed aggregate distributions of the perturbed data. In [19], a condensation based approach is proposed. Data are first clustered into groups, and then pseudo data are generated from those clustered groups.
Data mining tasks are then done on the generated synthetic data instead of the original data.Comparing to the works discussed above, the work discussed in this paper is different by using genetic based neural network to construct privacy preserving classifier. The activation function of the neural network is computed using the ElGamal scheme to preserve the privacy of the classifier. The neural network is used to train the system. The weights of the neural network are optimized using genetic algorithm.


The block diagram of the proposed system is illustrated in Figure 1. The major components of the system are Neural Network Owner, Training Engine, Optimization Engine, and Classification Engine.
A. Heart Disease Data Set
The Cleveland heart disease data provided by the UCI Machine Learning Repository [22] is used for analysis of this work. The dataset has 13 numeric input attributes namely age, sex, chest pain type, cholesterol, fasting blood sugar, resting ecg, maximum heart rate, exercise induced angina, old peak, slope, number of vessels colored and thal. It also has the predicted attribute ie) the class label.
B. Neural Network Owners
In this paper, we proposed a two party distributed algorithm for privacy preserving genetic based neural network training with vertically partitioned data. We considered that there are two neural network owners, each having their own set of data. These two owners have to build one neural network based on all the data, but each party does not reveal their own data to each other. There is only one hidden layer in the neural network and the hidden nodes are chosen based on trial and error.
Elgamal is a public key encryption scheme [24] which can be defined on any cyclic group. Let G be a cyclic group with prime order q and generator g. The components of ElGamal scheme are Key generation, Encryption, and Decryption.
Algorithm 1: Elgamal Scheme
Step 1: A value x belongs to Zp is randomly chosen as the private key. The corresponding public key is (G,q,g,h), where h=gx
Step 2: A message m belongs to G is encrypted as follows: A value r belongs to Zp is chosen as random. Then the ciphertext is constructed as (C1,C2)=(gr,
Step 3: The plain text is computed as
In this paper, we are considering two parties and each party only holds one part of the input to the sigmoid function. This algorithm enables them to compute the approximate value of the function without knowing the part of input from the other party. Actually, in this algorithm there is no way for each party to explore the input of the other, but the function value can still be computed. Formally, the input of the algorithm is x1 held by party A, x2 held by party B. The output of function y, y(x1 + x2), is also randomly shared by the two parties. Note that the parties can always exchange their random shares of result at the end of the algorithm, so that they can learn the complete value of sigmoid function.
Algorithm 2: Sigmoid Function
Step 1: Party A generates a random number R and computes mi=y(x1+i)-R, -n<i<=n. Party A encrypts each mi using Algorithm1 and gets E(mi,ri),where each ri is a new random number. It sends each E(mi,ri) in the increasing order of i.
Step 2: Party B picks E(mx2,rx2), randomizes it and sends E(mx2,r1) back to A, where r1=rx2+s, and s is only known to party B.
Step 3: Party A partially decrypts E(mx2,r1) and sends partially decrypted message to B
Step 4: Party B finally decrypts the message to get mx2=y(x1+x2) - R. R is only known to A and mx2 is only known to B. The function f(x) is computed as, mx2+R=y(x1+x2) = f(x)
C. Training Engine
The algorithm used to train the network is a modified version of back propagation algorithm. The input layer consists of 13 nodes, the hidden layer consists of 7 nodes and the output layer consists of 5 nodes. The hidden layer nodes are selected based on trial and error. The activation function used by the neurons is the sigmoid function [25].
D. Optimization Engine
Genetic algorithm is used to optimize the weights of the neural network. The proposed neuro genetic approach is the combination of training and weight optimization subsystem. The proposed algorithm is explained as follows: Let p, q, and r represents the number of neurons in the input, hidden, and output layers respectively. Wij represents the weight vector for the vertices between input layer nodes to hidden layer nodes. Wjk represents the weight vector for the vertices between hidden layer nodes to output layer nodes. Eo represents the expected output for a given data Xo [23].
Algorithm 3: Proposed Algorithm
Step 1: Population of chromosomes is initialized with random numbers between 0 and 1.
Step 2: For every chromosome in the population
Step 2.1: Initialize root mean square error (RME) to 0
Step 2.2: for every data Xo(x1,x2,…,xp), in the training set, compute
Step 2.2.1: Output of the input layer neurons OiI=xi, i=1 to p
Step 2.2.2: Input to the hidden layer neurons
For each hidden layer neuron hj, party A computes Σ j<= mA Wijxj and party B computes Σ mA< j <=mA+mB Wijxj
Step 2.2.3: Output of the hidden layer neurons
Using Algorithm 2, Party A and B jointly computes the sigmoid function for each hidden layer node hj and obtain the random shares hj1+hj2=f(ΣjWijxj)
Step 2.2.4: Hidden to the output layer neurons
For each output layer node Ok, party A computes Ok1=Σk Wjkhj1 and Party B computes Ok2=Σk Wjkhj2, such that Ok=Ok1+Ok2
Step 2.2.5: Output of the output layer neurons
Using Algorithm 2, Party A and B jointly computes the sigmoid function for each of the output layer neurons.
Step 2.2.6: Cumulative error
Step 2.3: Calculate the average error
Step 2.4: Compute the fitness of the chromosome
Step 3: If the threshold value is not reached
Step 3.1: select top 50% of the chromosome based on the fitness value
Step 3.2: Apply crossover and mutation on the selected chromosomes to obtain another 50% of the chromosomes
Step 4: goto step 2
E. Classification Subsystem
The trained neural network is used for classification. If the user submits a query to the classification subsystem, the privacy preserving neuro genetic classifier predicts the risk of heart disease data.


The Cleveland Heart Disease Dataset provided by the UCI Machine Learning Repository [9] is used for training and testing the medical diagnosis system. The distribution of dataset is given in Table 1. Among the 303 instances of data, 200 instances are used for training and 103 instances are used for testing.
The classifier classifies that the given data belongs to presence of heart disease or absence of heart disease. A confusion matrix contains information about actual and predicted classifications done by the classification system. The training and testing dataset classification by the proposed approach is given in Table 2. and Table 3. respectively.
The performance measures of the testing data are given in Table 4. The accuracy and the precision of the classifier is calculated using the true positive, false positive, true negative and false negative values. The classification accuracy of testing set is 93.2%.


In this paper, a privacy preserving neuro genetic approach is proposed to predict the risk of heart disease data. The dataset for analysis purpose is taken from UCI machine learning repository. The datasets are vertically partitioned into two sets and given to two neural network owners, each owner having their own set of data. These two owners jointly build a neural network which is securely trained using the genetic based neural network algorithm. The final network is used for classification. The classification accuracy obtained using this approach is 93.2%.
There are many interesting aspects for future work. The datasets can be partitioned horizontally to construct a classifier. More than two neural network owners can be considered. More than one hidden layer can be used to construct the classifier. The activation function can be varied in each layer.

Tables at a glance

Table icon Table icon Table icon Table icon
Table 1 Table 2 Table 3 Table 4

Figures at a glance

Figure 1
Figure 1