Evaluation of the COVID-19 era by using machine learning and interpretation of confidential dataset

Andreas Andreou, Constandinos X. Mavromoustakis, George Mastorakis, Jordi Mongay Batalla, Evangelos Pallis

Research output: Contribution to journalArticlepeer-review

Abstract

Various research approaches to COVID-19 are currently being developed by machine learning (ML) techniques and edge computing, either in the sense of identifying virus molecules or in anticipating the risk analysis of the spread of COVID-19. Consequently, these orientations are elaborating datasets that derive either from WHO, through the respective website and research por-tals, or from data generated in real-time from the healthcare system. The implementation of data analysis, modelling and prediction processing is performed through multiple algorithmic tech-niques. The lack of these techniques to generate predictions with accuracy motivates us to proceed with this research study, which elaborates an existing machine learning technique and achieves valuable forecasts by modification. More specifically, this study modifies the Levenberg–Marquardt algorithm, which is commonly beneficial for approaching solutions to nonlinear least squares prob-lems, endorses the acquisition of data driven from IoT devices and analyses these data via cloud computing to generate foresight about the progress of the outbreak in real-time environments. Hence, we enhance the optimization of the trend line that interprets these data. Therefore, we in-troduce this framework in conjunction with a novel encryption process that we are proposing for the datasets and the implementation of mortality predictions.

Original languageEnglish
Article number2910
JournalElectronics (Switzerland)
Volume10
Issue number23
DOIs
Publication statusPublished - 1 Dec 2021

Keywords

  • Antiviral
  • Machine learning
  • Post-COVID-19
  • Spatial distancing
  • Sustainable
  • Urban

Fingerprint

Dive into the research topics of 'Evaluation of the COVID-19 era by using machine learning and interpretation of confidential dataset'. Together they form a unique fingerprint.

Cite this