Yaseen
Yaseen
A PROJECT REPORT
On
BACHELOR OF ENGINEERING
In
COMPUTER SCIENCE & ENGINEERING
Submitted by
CERTIFICATE
Phase-II
This is to certify that the Project Report titled “FOG DATA ANALYSIS FOR SMART
HEALTHCARE SYSTEM” is a bonafide work carried out by MR. MOHAMMED
YASEEN (USN 1RG17CS033), SYED WASHIM HYDER(1RG16CS102),
MOHAMMED SHIBILE(1RG17CS034),ABHINAND K P(1RG17CS003) in partial
fulfillment for the award of Bachelor of Engineering in Computer Science and
Engineering of the Visvesvaraya Technological University, Belagavi, during the year
2021-2022. It iscertified that all corrections/suggestions given for Internal Assessment have
been incorporated in the report. This project report has been approved as it satisfies the
academic requirements in respect of project work prescribed for the said degree.
External Viva
Name of the Examiners Signature with date
1.
2.
VISVESVARAYA TECHNOLOGICAL UNIVERSITY
Jnana Sangama, Belgavi-590018
DECLARATION
We hereby declare that the project work entitled “FOG DATA ANALYSIS FOR SMART
HEALTHCARE SYSTEM” submitted to the Visvesvaraya Technological University,
Belagavi during the academic year 2021- 2022, is record of an original work done by us under
the guidance of Mrs. Soniya Komal, Asst. Professor, Department of Computer Science and
Engineering, RGIT, Bengaluru in the partial fulfillment of requirements for the award of the
degree of Bachelor of Engineering in Computer Science & Engineering. The results embodied
in this project have not been submitted to any other University or Institute for award of any degree
or diploma.
We take this opportunity to thank our college Rajiv Gandhi Institute of Technology,
Bengaluru for providing us with an opportunity to carry out this project work.
We express our gratitude to Dr. D G Anand, Principal, RGIT, Bengaluru for providing the
resources and support without which the completion of this project would have been a difficult task.
We extend our sincere thanks to Mrs. Arudra A, Associate Professor and Head, Department
of Computer Science and Engineering, RGIT, Bengaluru, for being a pillar of support and
encouraging us in the face of all adversities.
We would like to acknowledge the thorough guidance and support extended towards us by
Mrs. Geetha Pawar, Assistant Professor, Dept. of CSE, RGIT, Bengaluru, Dr. Anthony Raj,
Assistant Professor, Dept. of CSE, RGIT, Bengaluru. Their incessant encouragement and valuable
technical support have been of immense help. Their guidance gave us the environment to enhance
our knowledge and skills and to reach the pinnacle with sheer determination, dedication and hard
work.
We also want to extend our thanks to the entire faculty and support staff of the Department
of Computer Science and Engineering, RGIT, Bengaluru, who have encouraged us throughout the
course of the Bachelor’s Degree. We want to thank our family for always being there with full
support and for providing us with a safe haven to conduct and complete our project. We are ever
grateful to them for helping us in these stressful times.
Lastly, we want to acknowledge all the helpful insights given to us by all our friends during
the course of this project.
MOHAMMED YASEEN(1RG17CS033)
ABSTRACT
Cloud computing is an on-demand service that provides storage, network, power to do intensive
computing, it also provides intensive sharing of resources, even though the users use all these advantages,
they have to also deal with the privacy-related issues to the data stored in the cloud, where the data may
get leaked or may be accessed by the service provider. The current health care systems implemented on
the cloud poses threat to the privacy of the data of the patients since data breaches cost millions to billions
of dollars to the health care institutions every year this problem can be taken care with the fog based
health care system, where the fog technology offers more additional advantages like low latency,
resource management, less power consumption, etc.
II
Table of Contents
ACKNOWLEDGEMENT ..................................................................................................... I
ABSTRACT ...........................................................................................................................II
TABLE OF CONTENTS ................................................................................................... III
LIST OF FIGURES ............................................................................................................ VI
LIST OF TABLES ................................................................................................................. V
CHAPTER 1
INTRODUCTION ..................................................................................................................1
1.1 Problem Statement ............................................................................................................. 2
1.2 Objectives of the project .................................................................................................... 2
1.3 Project deliverables ............................................................................................................ 3
1.4 Current scope ...................................................................................................................... 3
1.5 Future scope ........................................................................................................................3
_TOC_250038
CHAPTER 2
LITERATURE SURVEY ...................................................................................................... 4
CHAPTER 3
SYSTEM REQUIREMENT SPECIFICATION ................................................................ 9
3.1 Hardware Requirements..................................................................................................... 9
3.2 Software Requirements ...................................................................................................... 9
3.3 Functional Requirements ................................................................................................. 10
3.4 Non Functional Requirements ......................................................................................... 10
CHAPTER 4
SYSTEM DESIGN AND ARCHITECTURE ................................................................... 11
4.1 System Architecture ......................................................................................................... 11
4.2 Use case Diagram ............................................................................................................ 13
4.3......................................................................................................... Data
flow Diagram Level .......................................................................................................... 15
4.4......................................................................................................... E R
diagram.............................................................................................................................. 16
4.5........................................................................................................ Activ
ity Diagram ...................................................................................................................... 17
Table of Contents
4.6........................................................................................................ Sequ
ence Diagram ................................................................................................................... 19
CHAPTER 5
IMPLEMENTATION .........................................................................................................22
5.1 Tools instruction ..............................................................................................................22
5.2 Technology instruction ................................................................................................... 23
5.3 Overall view .................................................................................................................... 24
5.4 Algorithm and implementation ....................................................................................... 25
5.5 Modules........................................................................................................................... 27
5.6 Conclusion .......................................................................................................................28
CHAPTER 6
OUTPUT SNAPSHOTS ......................................................................................................29
6.1 Results snapshots .............................................................................................................29
6.2 Comparision table ............................................................................................................35
6.3 Contribution to the existing system .................................................................................41
CHAPTER 7
TESTING AND RESULTS .................................................................................................43
7.1 Testing..............................................................................................................................43
7.2 Test Cases ........................................................................................................................45
CHAPTER 8
CONCLUSION.....................................................................................................................47
REFERENCES .....................................................................................................................49
BASE PAPER .......................................................................................................................55
FIGURES
Page | 1
FOG DATA ANALYSIS FOR SMART HEALTHCARE SYSTEM
A solution to this is to provide fog architecture, as the data remains local, the computation
is much faster. In this paper, our main aim is to improvise the existing work on the
healthcare systems. We have discussed the various algorithms that can be used to get the
result. The algorithm selected for this work is decided by comparing the various algorithms
on factors like accuracy, precision, energy consumption etc. Then that particular
algorithm is used to predict the patients’ heart disease by studying factors like blood
pressure,cholesterol etc. (discussed in section IV). The result is then forwarded further to
patients’ android devices. We have considered the master- slave architecture to build the
fog system.
Maintaining the privacy of the patient data in a health care sector has garnered a lot of
attention and processing that particular data must also be prioritized since there is
voluminous data available today handing it over the cloud becomes a tedious task. A
solution to that is incorporating the fog layer in our network. Cloud layer brings up high
latency which is resolvedby the fog layer which offers low latency communication.
1. Health care data is collected from smart devices integrated with the synthetic data.
2. The data collected is further uploaded to the nodes present of the fog layer.
3. In fog layer data is preprocessed, cleaned and normalized.
4. After gaining data insights, data is further classified by applying machine learning algorithms.
5. Classified data is secured as the data is local data.
To collect data from several iot devices, save the data on the server. Then collect patient data,
compare those parameters with the saved data and predict the output telling if the user is
suffering from any heart disease or not by looking up several conditions. The data processing
is done over the fog layer so that the burden on the cloud layer is reduced.
When saving the data, it incorporates a block chain so that the security is maintained and access
to the data is done only to authorized persons
2.1 Introduction
The fog infrastructure has a set of devices with no computational abilities. As we were
going via the use of test cases, we saw that in fog computing despite the potential, there
has been onlya little implementation in the healthcare domain. Data management has a
significant role in fogcomputing, this can be used by sensual statistics and is used to
remove evocative data for operator response. It is also used for data filtration, data
compression etc.
For any latency-sensitive applications like smart healthcare and smart city, the high-
latency interaction between IoT, sensor devices and the Cloud datacenters is very high
and hence unacceptable and it degrades the quality of service. In addition, IoT devices
can produce a vastamount of data in just a fraction of a second. When these huge number
of IoT devices concurrently initiates transferring of the information to Cloud servers
through the Internet, critical network congestion will occur. To erase these obstacles of
the Cloud based IoT model,Fog computing architecture emerged as shown in Fig 2.1 [1].
A computing architecture involving Fog-based Smart Healthcare System for the
prediction of disease which uses deep learning algorithms and input from IoT devices
known as HealthFog was proposed to provide effective service to heart patients and
others, who are in need of real-time output, with less delay in response, minimum energy
and power consumption and better accuracy. HealthFog provides this service as a fog
computing service and also effectively handles the information of patients and it gets
generated from several IoT devices as shown in Fig. 2.2 [2].
Page | 4
FOG DATA ANALYSIS FOR SMART HEALTHCARE SYSTEM
Fig. 2.2 The proposed architecture diagram presented by Health Fog [2].
The fog computing paradigm contains a bunch of devices having zero computational
abilities such as sensors and collection of resources, which offer calculated power,
storage capacity and more, which are fog architecture nodes and cloud architecture servers
which are interconnected to form a system. We can find huge differences among the
behaviours of all these devices. These might concern, among other characteristics, like the
CPU generated power,hard disk capability, network bandwidth, computation latency, and
RAM size as shown in Fig.2.3 [3].
The Internet of things that depends on skills gives a large number of facilities and
inventions within the healthcare domain but the maximum of these facilities and
inventions are still under development. The concept of IoT, fog computing and
combination of both in the healthcare domain is presented in this research work as shown
in Fig. 2.4 [4].
Computing architecture involving the Fog paradigm is nothing but an elaboration of the
existing classic computing architecture involvingCloud network. This is designed in
order to support IoT applications characterized by limitations of security and latency.
Even though computing, storage and networking are both Cloud computing and Fog
computing features, thefog has specific features, low latency, geographic distribution, and
a huge number of computing architecture nodes compared to the centralized Cloud
computing, thus fog supports mobility and real-time interaction as shown in Fig. 2.5 [5].
In the work network coding convention for wireless fog computing, they have received a
novel transport layer information dispersal protocol known as Dissemination of Small
Values (DSV)of the architecture to apply the ideas of networks involving coding. DSV
is another correspondence convention produced for the TinyOS working framework.
Fig. 2.6 A network coding protocol for wireless sensor fog computing[6].
For any Internet of things framework which comprises computing involving a fog
architecture layer, the proposed engineering should be either application particular or
application specific. This design can be comprehensively arranged into fundamental
layers, things involving layers,fog architecture layers and a cloud architecture layer. The
things layer is a point where IoT gadgets are available and an assortment of information
occurs. The Fog layer comprises a few decentralized hubs present in every area. This layer
plays out the undertaking of dealing with the organizations and the information obtained.
The essential handling of information is done here. IoT based applications are improved
by controlling the information transmission to the computing architecture involving the
cloud layer, consequently decreasing the solicitation reaction delay taken for an IoT
application as shown in Fig. 2.7 [7].
IfogSim, a simulation tool for fog computing, enables the modeling and simulation
of Fog computing to evaluate resource management across edge resources under
different scenarios. CloudSim is the layer responsible for taking care of operations
between Fog architecture components in the iFogSim simulator. The implementation of
iFogSim is made of simulated entities and services as shown in Fig. 2.8 [8].
CHAPTER 3
Front-end ASP.NET
Back-end JAVA
API development Flask REST
Page | 11
FOG DATA ANALYSIS FOR SMART HEALTHCARE SYSTEM
Like the cloud layer, the fog layer is also an environment having local systems as master
and slave nodes, as shown in Fig. 4.1. Here we are creating the Fog computing
architecture environment using a local system(our laptop where we are computing or
achieving analysis ofdata) and an android app(our mobile where the user will get the data
computing result). As ourproject architecture says we have users at one end i.e patients
and the doctor will collect the data for example. age, gender, blood sugar, blood pressure,
ecg, cholesterol level etc. and at the doctor end he will feed the data through web
application which acts a gateway and the local system which is master node (includes
data manager, data storage, resource manager, machine learning model, cloud integrator)
will take the data fed by doctor or analyzer at web application end and preprocess it and
classify based on naive bayes algorithm and predicts the disease and forward the result
from cloud integrator(azure) is delivered as notification of name, disease name and date
of prediction to user's android application which is slave node. Here we are using local
data which is kept private and it is only accessed by the admin(doctor). One important
thing to note is that data is local, there is less delay in delivering the result so Fog is
better than cloud.
A graphical user interface (GUI) is the way that users interface with the Windows and
Macintosh operating systems. This is also referred to as a point-and-click interface. Users
can use a mouse to click on an object and drag it into position. Our project graphical user
interfacediagrams are shown in Fig. 4.2 and Fig. 4.3.
Sequence Diagrams are interaction diagrams that detail how operations are carried out. They
capture the interaction between objects in the context of a collaboration. Sequence Diagrams
are time focused and they show the order of the interaction visually by using the vertical axis
of the diagram to represent what messages are sent and when. Our project sequence
diagramsare shown in Fig. 4.6 and Fig. 4.7.
A data flow diagram shows the way information flows through a process or system. It
includesdata inputs and outputs, data stores, and the various sub processes the data moves
through. DFDs are built using standardized symbols and notation to describe various
entities and their relationships. The objective of a DFD is to show the scope and
boundaries of a system as a whole. The diagram alongside represents the data flow
diagram of the proposed system. Ourproject data flow diagrams at user and admin side
are shown in Fig. 4.8 and Fig. 4.9.
4.7 Conclusion
In the conducted experiment,the main spotlight is on the domain of healthcare for patients
suffering from heart problems by suggesting a novel Fog based Smart Healthcare System
created with a fog environment with one master and many slave architectures for
spontaneous detection of the heart using machine learning. Here we use decision trees and
Naive Bayes techniques for prediction. Fog environment is very flexible and it can be
used to provide healthcare as a service and coherently manage the input of the sufferer
which is imminent from different IoT devices. Here we are reducing latency or delay in
communication and improving efficiency. In the future we would like to develop a one
to one communication between the master node and the slave node. And for further
increase in security we would liketo implement the system with blockchain.
Hardware Requirement:
Software Requirement:
➢ Windows 10
➢ Visual studio 2019.
➢ SQL Server 2019.
It was first featured in the late 1990s by Microsoft to execute primarily on windows os.
Page | 22
FOG DATA ANALYSIS FOR SMART HEALTHCARE SYSTEM
The library used to execute is FCL[Framework Class Library], which also supports using
two or more programming languages on the same platform.
The environment created for execution is known as Common Language Runtime where a
virtual concept is made use to manage all aspects like protection, data management,
exception management.
Any customer entered values to the server are kept by Server controls. This control state will
not be put away on the server. keep in mind likewise that customer-side content is not
required.
These asp.net server controls can be used in structural jobs such as security,data access, data
manipulation, creating master pages and validation. In addition, all the events, methods and
properties possessed by the System.Web.UI.Control and WebControl class are inherited by
asp.netserver control.
Microsoft SQL Server: The Microsoft SQL Server is basically a SQL based, client
and worker information storage. Each of these words describes a foundation part of the
working of aSQL Server.
Database: The database organises the data in a structured manner that can be accessed easily
using language specific queries.The data in a database is usually supplied to a specific
applicationthat makes use of the data to produce useful business insights.A manufacturing
data warehouse can be built to store huge amounts of data.
The database contains tables, attributes, views, and procedures to support the
A particular database can be allocated in the backend for a live worker. An interconnecting
segmentis used so applications can run for a single client and disclose the information base
for an organization. The SQL Server correspondence segment permits execution between a
framework executing on the worker node and SQL Server.
The design of the system application allows working with many customers simultaneously
and SQL server also supports the same feature to support the application framework. It also
provides isolation to the data such that other users cannot modify the data being used by
others.
Structured Query Language (SQL) : To retrieve the information from a data set, there
is a need to utilize a defined order and proclamations that are explained in the DBMS
programming language syntax. There exist many programming languages,which are utilized
along with social information bases.
SQL Server manages various databases, with each informational index stores either data with
relations or data disengaged in various informational collections. With a real world example,
a laborer with one informational index that accommodates singular information and another
one thatsaves dependent data. Contrarily, one information base can be loaded with live client
request information, and another with a related data set can store chronicled client
arrangements that are utilized for yearly revealing.An information base, comprehends the
pieces of a data set and to planthe parts to assure that the data set works in a consistent format
after it is carried out.
Admin Module:
6. Sight the Training Data as well as add any new data if required.
User Module:
4. Provide feedback
5. Sight doctor
5.5 Conclusion
Naive Bayes' calculations have been used extensively in spam filtering,determining the
feelingsof the crowd,giving suggestions based on the study of history and so forth. They
are quick andelementary to execute, yet their greatest obstacle is that the prerequisite of
index is to be autonomous. Complementing this with the decision tree will give us the
most consequential result prediction.
Choice Support in the Heart Disease Prediction System is likewise evolved utilizing the
NaiveBayesian Classification strategy. Treatment records of millions of patients can be
put away andmechanized and information mining strategies may help in several
significant and basic inquiries identified with medical care. Naive Bayes order can
be utilized as a best choiceemotionally supportive network.
<tr>
<td height="250" align="center" class="auto-style2">
<asp:ImageButton ID="ImageButton1" runat="server"
ImageUrl="/images/Admin.jpg" PostBackUrl="/AdminLogin.aspx" Width="170px"
/>
</td>
Web.config
<?xml version="1.0"?>
<configuration>
<connectionStrings>
<add name="Heart" connectionString="Data Source=SG2NWPLS14SQL-
v09.shr.prod.sin2.secureserver.net;Initial
Catalog=Healthfog;User
ID=Healthfog;Password=Ws27$5xm" providerName="System.Data.SqlClient"/>
</connectionStrings>
The following attributes can be set on the <httpRuntime> tag.
<system.Web>
<httpRuntime targetFramework="4.5" />
</system.Web>
-->
<system.web>
<compilation debug="true" targetFramework="4.5"/>
<authentication mode="Forms">
<forms loginUrl="~/Account/Login.aspx" timeout="2880"/>
</authentication>
<membership>
<providers>
<clear/>
<add
name="AspNetSqlMembershipProvider"
type="System.Web.Security.SqlMembershipProvider"
connectionStringName="ApplicationServices" enablePasswordRetrieval="false"
enablePasswordReset="true"
requiresQuestionAndAnswer="false"
requiresUniqueEmail="false"
maxInvalidPasswordAttempts="5"
minRequiredPasswordLength="6" minRequiredNonalphanumericCharacters="0"
passwordAttemptWindow="10" applicationName="/"/>
</providers>
Dept.of CSE, RGIT 2021-22 Page | 31
FOG DATA ANALYSIS FOR SMART HEALTHCARE SYSTEM
</membership>
<profile>
<providers>
<clear/>
<add
name="AspNetSqlProfileProvider" type="System.Web.Profile.SqlProfileProvider"
connectionStringName="ApplicationServices" applicationName="/"/>
</providers>
</profile>
<roleManager enabled="false">
<providers>
<clear/>
<add
name="AspNetSqlRoleProvider" type="System.Web.Security.SqlRoleProvider"
connectionStringName="ApplicationServices" applicationName="/"/>
<add
name="AspNetWindowsTokenRoleProvider"
type="System.Web.Security.WindowsTokenRoleProvider" applicationName="/"/>
</providers>
</roleManager>
<pages controlRenderingCompatibilityVersion="4.0"/>
</system.web>
<system.webServer>
<modules runAllManagedModulesForAllRequests="true"/>
</system.webServer>
</configuration>
MasterPage.master
<%@ Master Language="C#" AutoEventWireup="true"
CodeFile="MasterPage.master.cs" Inherits="MasterPage" %>
<html xmlns="http://www.w3.org/1999/xhtml">
<head runat="server">
<title></title>
<asp:ContentPlaceHolder id="head" runat="server">
</asp:ContentPlaceHolder>
}
.intabular
{
-webkit-border-radius: 10px;
-moz-border-radius: 10px;
background-color:White;
}
.sidebar
{
-webkit-border-radius: 10px;
background-color:White;
}
</style>
</head>
<body style="background-image:url(images/Heart_Background.jpg); background-
attachment: fixed">
<tr>
<td colspan="2">
<img src="images/human-heart.jpg" width="100%" class="intabular"/>
</td>
</tr>
<tr>
<td colspan="2">
<asp:Panel ID="Panel1" runat="server">
<ul id="css3menu1" class="topmenu">
<li class="topfirst"><a href="AddDoctor.aspx" style="height:16px;line-
height:16px;">Add Doctor</a></li>
<li class="topmenu"><a href="AddTrainingData.aspx" style="height:16px;line-
height:16px;">Add Training Data</a></li>
<li class="topmenu"><a href="ViewUser.aspx" style="height:16px;line-
height:16px;">View User</a></li>
<%--<li class="topmenu"><a href="ViewDoctor.aspx" style="height:16px;line-
</asp:ContentPlaceHolder>
</center>
</td>
</tr>
<tr>
<td style="background-color: #333333; color: #e4c4ab;" align="right"
class="intabular">
Fog Data Analysis For Smart HealthCare System || Team Yaseen </td>
</tr>
</table>
</center>
</div>
</form>
</body>
</html>
CheckHeart.aspx
<%@ Page Title="" Language="C#" MasterPageFile="~/MasterPage.master"
AutoEventWireup="true" CodeFile="CheckHeart.aspx.cs" Inherits="CheckHeart" %>
{
height: 40px;
}
.style10
{
-webkit-border-radius: 10px;
-moz-border-radius: 10px;
font-family: Calibri;
}
.style11
{
font-family: Calibri;
font-size: large;
color: #333333;
font-weight: 700;
}
.style12
{
-webkit-border-radius: 10px;
-moz-border-radius: 10px;
font-family: Calibri;
font-size: large;
}
.style13
{
width: 20%;
}
.style14
{
width: 20%;
}
.auto-style1 {
}
</style>
</asp:Content>
<asp:Content ID="Content2" ContentPlaceHolderID="ContentPlaceHolder1"
Runat="Server">
<asp:Panel ID="Panel1" runat="server">
<asp:Label ID="Label1" runat="server" Text="Results :" style="font-size: x-
large"></asp:Label>
<asp:Label ID="Label2" runat="server" Text="" style="font-size: x-
large"></asp:Label>
</asp:Panel>
<br />
<table style="border: 1px solid #C0C0C0; background-image: url('Images/bg.jpg'); "
width="60%" class="intLog">
<tr>
<td colspan="3"
style="background-image: url('Images/blurred.jpg')"
align="center" class="intLog" bgcolor="#CC3300">
<asp:Label ID="Label3" runat="server" style="font-family: calibri; font-size: xx-large;
color: #FFFFFF;" Text="-- Check your Heart --"></asp:Label>
</td>
</tr>
<tr>
<td colspan="3" align="right" style="color: #FF0000; font-size: small">
</td>
</tr>
<tr>
<td colspan="3" align="center" style="color: #FF0000; font-size: small">
* Kindly fill up all the details given below<br />
</td>
</tr>
<tr>
</td>
<td align="left">
</td>
<td width="33%" align="left" class="style14">
</td>
</tr>
<tr>
<td align="right" class="style13">
</td>
<td align="left">
<asp:TextBox ID="TextBox14" runat="server" CssClass="style12"
placeholder=" Chest Pain Type" required="Required"
Width="100%"></asp:TextBox>
</td>
<td width="33%" align="left" class="style14">
</td>
</tr>
<tr>
<td align="right" class="style13">
</td>
<td align="left">
</td>
<td width="33%" align="left" class="style14">
</td>
</tr>
<tr>
<td align="right" class="style13">
</td>
<td class="style9" align="left" >
<asp:TextBox ID="TextBox4" runat="server" CssClass="style12"
placeholder=" Fasting Blood Sugar" required="Required"
Width="100%"></asp:TextBox>
<tr>
<td align="right" class="style13">
</td>
<td>
</td>
</tr>
<tr>
<td align="right" class="style13">
</td>
<td>
<asp:TextBox ID="TextBox5" runat="server" CssClass="style12"
placeholder=" Resting Electrographic" required="Required"
Width="100%"></asp:TextBox>
</td>
</tr>
<tr>
<td align="right" class="style13">
</td>
<td>
</td>
<td width="33%" class="style14">
</td>
</tr>
<tr>
<td align="right" class="style13">
</td>
<td>
<tr>
<td align="right" class="style13">
</td>
<td>
<asp:TextBox ID="TextBox8" runat="server" CssClass="style12"
placeholder=" No. of Major Vessels(CA) " required="Required"
TextMode="SingleLine" Width="100%"></asp:TextBox>
</td>
<td width="33%" class="style14">
</td>
</tr>
<tr>
<td align="right" class="style13">
</td>
<td>
</td>
<td width="33%" class="style14">
</td>
</tr>
<tr>
<td align="right" class="style13">
</td>
<td>
<asp:TextBox ID="TextBox9" runat="server" CssClass="style12"
placeholder=" Thal" required="Required" TextMode="SingleLine"
Width="100%"></asp:TextBox>
</td>
<td width="33%" class="style14">
</td>
</tr>
<tr>
<td align="right" class="style13">
<td>
</td>
<td width="33%" class="style14">
</td>
</tr>
<tr>
<td align="right" class="style13">
</td>
<td>
<asp:TextBox ID="TextBox10" runat="server" CssClass="style12"
placeholder=" Trest Blood Pressure" required="Required" TextMode="SingleLine"
Width="100%"></asp:TextBox>
</td>
<td width="33%" class="style14">
</td>
</tr>
<tr>
<td align="right" class="style13">
</td>
<td>
</td>
<td width="33%" class="style14">
</td>
</tr>
<tr>
<td align="right" class="style13">
</td>
<td>
<asp:TextBox ID="TextBox11" runat="server" CssClass="style12"
placeholder=" Serum Cholesterol" required="Required" TextMode="SingleLine"
Width="100%"></asp:TextBox>
</td>
</td>
</tr>
<tr>
<td align="right" class="style13">
</td>
<td>
</td>
<td width="33%" class="style14">
</td>
</tr>
<tr>
<td align="right" class="style13">
</td>
<td>
<asp:TextBox ID="TextBox12" runat="server" CssClass="style12"
placeholder=" Maximum Heart Rate achieved(Thalach)" required="Required"
TextMode="SingleLine" Width="100%"></asp:TextBox>
</td>
<td width="33%" class="style14">
</td>
</tr>
<tr>
<td align="right" class="style13">
</td>
<td>
</td>
<td width="33%" class="style14">
</td>
</tr>
<tr>
<td align="right" class="style13">
</td>
</td>
</tr>
<tr>
<td align="right" class="style13">
<td>
<asp:Label ID="lblAge" runat="server" Visible="False"></asp:Label>
<asp:Label ID="lblSex" runat="server" Visible="False"></asp:Label>
</td>
<td width="20%">
</td>
</tr>
</table>
</asp:Content>
Register.aspx
<%@ Page Title="" Language="C#" MasterPageFile="~/MasterPage.master"
AutoEventWireup="true" CodeFile="Register.aspx.cs" Inherits="Register" %>
font-family: Calibri;
}
.style11
{
font-family: Calibri;
font-size: large;
color: #333333;
font-weight: 700;
}
.style12
{
-webkit-border-radius: 10px;
-moz-border-radius: 10px;
font-family: Calibri;
font-size: large;
}
.style13
{
width: 20%;
}
.style14
{
width: 20%;
}
</style>
</asp:Content>
<asp:Content ID="Content2" ContentPlaceHolderID="ContentPlaceHolder1"
Runat="Server">
<table style="background-image: url('Images/bg.jpg'); "
width="60%" class="intLog">
<tr>
<td colspan="4"
<tr>
<td align="right" class="style13">
</td>
<td align="left" colspan="2">
<asp:TextBox ID="TextBox3" runat="server" CssClass="style12"
placeholder=" Mobile No." required="Required" MaxLength="10"
Width="100%"></asp:TextBox>
<br />
<asp:RegularExpressionValidator ID="RxvMobNo" runat="Server"
ControlToValidate="TextBox3" ErrorMessage="Invalid Mobile No.!"
ForeColor="#FF3300" ValidationExpression="^[7-9]\d{9}$"
style="font-family: Calibri"></asp:RegularExpressionValidator>
</td>
<td width="33%" align="left" class="style14">
</td>
</tr>
<tr>
<td align="right" class="style13">
</td>
<td class="style9" align="left" colspan="2" >
<asp:TextBox ID="TextBox4" runat="server" CssClass="style12"
placeholder=" Email Id" required="Required" Width="100%"></asp:TextBox>
<br />
<asp:RegularExpressionValidator ID="RxvEmail" runat="Server"
ControlToValidate="TextBox4" ErrorMessage="Invalid Email Id!"
ForeColor="#FF3300" ValidationExpression="\w+([-+.']\w+)@\w+([-.]\w+)\.\w+([-
.]\w+)*"
style="font-family: Calibri"></asp:RegularExpressionValidator>
</td>
<td width="33%" align="left" class="style14">
</td>
</tr>
</tr>
<tr>
<td align="right" class="style13">
</td>
<td colspan="2">
</td>
<td width="33%" class="style14">
</td>
</tr>
<tr>
<td align="right" class="style13">
</td>
<td colspan="2">
<asp:TextBox ID="TextBox6" runat="server" CssClass="style12"
placeholder=" Password" required="Required" TextMode="Password"
MaxLength="16" Width="100%"></asp:TextBox>
</td>
<td width="33%" class="style14">
</td>
</tr>
<tr>
<td align="right" class="style13">
</td>
<td colspan="2">
</td>
<td width="33%" class="style14">
</td>
</tr>
<tr>
<td class="style13">
</td>
</tr>
Result.aspx
<%@ Page Title="" Language="C#" MasterPageFile="~/MasterPage.master"
AutoEventWireup="true" CodeFile="Result.aspx.cs" Inherits="Result" %>
user)</i>
Once the admin login icon is clicked the admin login page will appear. Fig. 6.2 is the
snapshotof the admin page. the admin may login using his credentials.
Page | 55
FOG DATA ANALYSIS FOR SMART HEALTHCARE SYSTEM
The registered user has to enter his details like username and password and can login.If
the user is not registered he can register in the new user option using sign up. Fig. 6.3 is
the user login page.
The new user has to enter details like name, address, mobile no., email id, age, gender
and cangive a password and register. the Fig. 6.4 is the user registration page.
The Fig. 9.5 shows the example for new user registration.
And we can also add a new doctor to the list, by giving details like name , address,
mobilenumber, email id , age , gender, and filling the speciality of the field handled by
the doctor.
Fig. 6.1.7 is the add doctor page.
We can directly add training data to the database through the add training data page.
Fig. 6.1.8shows the add training data page.
We can see the disease result from the input given, and also symptoms and treatment
givenby the system. Fig. 6.1.10 is the snapshot of the same.
Disease results will be sent as notification to the slave node (User’s android application)
fromthe master node. Fig. 6.1.11 is the picture of the notification in the mobile
application.
RHE 3 0 4 0 0 0
HBP 0 4 0 4 0 0
CHF 1 0 8 0 0 0
STR 0 0 4 0 0 0
MH 0 0 0 0 4 0
A
HVD 0 0 0 0 0 4
disease TP TN FP FN ACCURACY
RHE 3 28 4 1 0.8811
HBP 4 28 4 0 0.8888
CHF 8 27 1 0 0.9722
STR 4 28 0 4 0.8888
MHA 4 32 0 0 0.1
HVD 4 32 0 0 0.1
When naive bayes is compared to various other algorithms we see that it has better
accuracythan others.
Fig. 6.2.2 Comparison of the Naive Bayse algorithm to other algorithms. [2]
The above graph shows the comparison of naive bayes with knn and logistic regression
on theirprecision.
Fig. 6.2.3 Comparison of the Naive Bayse algorithm to other algorithms in Google
Colabusing the Heart data set.
After applying Logistic regression, K-nearest neighbours and Naive Bayse algorithm, we
haveachieved a testing accuracy of 80%,67% and 93% respectively and thus we conclude
that NaiveBayse algorithm has a better accuracy.
Here in the above topology the data is being collected by the sensors and is being
delivered tothe fog nodes [slave, master] for the computation purpose, and to further
optimize theimplemented system the data can be sent to the cloud architecture so that the
output can be sent as an notification to the sufferer.
Prediction accuracy: The chosen dataset for this model comprises 1027 examples. To
improveon the testing accuracy and not to cause much delay to the training time, we must
divide the available training data equally across all the master nodes as shown in Fig.
6.16 and Fig. 6.17.
Fig. 6.2.5 Graph showing accuracy when algorithm is applied on different sizes of
trainingdataset [2].
Fig. 6.2.6 Graph showing accuracy when algorithm is applied on different sizes of
testingdataset [2].
As the calculation is applied to various sizes of dataset, we can see that the preparation
and testing precision increases with the expansion of the dataset. Here we have taken best
and normal perceptions of exactness for each dataset size and plotted the diagram to
demonstrate that as the size of the dataset builds the calculation's exhibition turns out to
be better.
Network usage: By the study of network usage in different cases and cloud, we can see
that the fog uses less bandwidth when compared to the cloud, in fog there is a chance that
the network bandwidth can increase when the worker node increases as shown in Fig.
6.2.7.
Fig. 6.2.8 Graph showing variation of network usage based on parameters such as
bandwidth.[2]
Power consumption: With the simulation observations The power consumption in the
fog node is less but in cloud is more because of the high capacity servers, but in fog there
is no need for the complex infrastructure and the setup is very simple when compared to
cloud as shown in Fig. 6.2.8.
After analyzing these parameters for result analysis we found that fog is better than
cloud andwe move ahead with fog architecture for the implementation of smart health
care systems.
• In our model which we have implemented follows the slave [replica] concept such
thatdon’t have to store the results in the master node but sent to the replica so
there is a better resource management and at the slave node we have achieved the
resource management as we have used azure cloud integrator in the fog
architecture for forwarding the result.
7.1 TESTING
• Meet the criteria that guided the design and development of the product.
• Responds to all types of inputs accurately,
• It completes its tasks in a reasonable amount of time.
• Is it useable in a reasonable amount of time?
• It can be installed and run in the contexts it was designed for.
• Obtains the desired general outcome from the stakeholders
Given the virtually limitless ways possible for the number of tests for even
simple components, all software testing employs some approach to pick tests which are
practicable given the time and things available. Therefore, software testing is commonly
(but not always) performed. Solely tries to run an application with the goal of getting to
know anything such as bugs in software. It provides objective, unbiased results,
impartial information to users about the quality of software and the danger of failure as
well as sponsors. As soon as executable software is available, software testing can begin.
In a staged approach, for example, the majority of testing occurs after the system
Page |69
FOG DATA ANALYSIS FOR SMART HEALTHCARE SYSTEM
Requirements have been specified and then implemented. Program that can be tested
Requirements, programming, and testing are all handled differently in an agile approach.
Testing is frequently carried out in parallel. Both valid and invalid inputs are chosen by
the test designer. It calculates the proper output without knowing anything about the
internals of the test object Structure.
Unit Testing
Single units of source code sets of one or more program modules, as well as
accompanying control data, processes, and procedures are examined to see whether they
are suitable for the use of unit testing.
Integration Testing
Individual software segments are joined and assessed as a group during the integration
testing phase of software testing. Integration testing is used to assess a system's or
component's compliance with stated functional requirements. It happens between unit
testing and validation testing.
System Testing
This is a type of testing that is done on an entire integrated system to see if it meets its
criteria. All the components that have successfully cleared the integration testing are
given into system testing.
For the sake of removing errors that are in various stages The topic of levels of testing
comes into the picture. The normal stages of testing are as follows:
A long sequence of tests was done on the proposed system as shown in Table 8.1 before
it wasall set to take user acceptance testing.
Since the project is on a large scale, developers would require testing to make it
successful. In the case where each piece works appropriately in every regard and provides
expected output for a wide range of data sources then the task is required to be efficient.
So if the destination issuccessful, this ought to be attempted.
• The system is not fully automated, it needs data from the user or Doctor for full
diagnosis.
• An internet connection is compulsory when running a web application. Still there are
many parts of the world where the internet is not accessible.
• Since in-fog environment controllers and storages are distributed across various
locations in the network, it needs more maintenance.
• Browser Support – Unfortunately, we don’t all use the same browser. This means
during development we have to ensure that all features have to be supported across a
variety of browsers.
Page | 74
REFERENCES
[1] Tuli, S., Mahmud, R., Tuli, S., & Buyya, R. (2019). FogBus: A blockchain-based
lightweight framework for edge and fog computing. Journal of Systems and Software, 154, 22-
36.
[2] Tuli, S., Basumatary, N., Gill, S. S., Kahani, M., Arya, R. C., Wander, G. S., & Buyya, R.
(2020). HealthFog: An ensemble deep learning based Smart Healthcare System for Automatic
Diagnosis of Heart Diseases in integrated IoT and fog computing environments. Future
Generation Computer Systems, 104, 187-200.
[3] Margariti, S. V., Dimakopoulos, V. V., & Tsoumanis, G. (2020). Modeling and Simulation
Tools for Fog Computing—A Comprehensive Survey from a Cost Perspective. Future Internet,
12(5), 89.
[4] Kumar, Y., & Mahajan, M. (2019). Intelligent behavior of fog computing with IOT for the
healthcare system. Int. J. Sci. Technol. Res, 8(07).
[5] Machado, J. D. S., Moreno, E. D., & Ribeiro, A. D. R. L. (2020). A survey on Fog
Computing and its research challenges. International Journal of Grid and Utility Computing,
11(4), 486-495
[6] Marques, B., Coelho, I.M., da Costa Sena, A. and Castro, M.C. (2019) ‘A network coding
protocol for wireless sensor fog computing’, Int. J. Grid and Utility Computing, Vol. 10, No.
3, pp.224–234.
[7] Adel, A. (2020). Utilizing technologies of fog computing in educational IoT systems:
privacy, security, and agility perspectives. Journal of Big Data, 7(1), 1-29
[8] Gupta, H., Vahid Dastjerdi, A., Ghosh, S. K., & Buyya, R. (2017). iFogSim: A toolkit for
modeling and simulation of resource management techniques in the Internet of Things, Edge
and Fog computing environments. Software: Practice and Experience, 47(9), 1275-1296.
[9] Kraemer, F. A., Braten, A. E., Tam Kittikhun, N., & Palma, D. (2017). Fog computing in
Page | 75
healthcare–a review and discussion. IEEE Access, 5, 9206-9222.
[10] Monteiro, A. (2016). Smart Fog Computing Interface for Healthcare Domain Applications.
[11] Bermbach, D., Pallas, F., Pérez, D. G., Plebani, P., Anderson, M., Kat, R., & Tai, S. (2017,
November). A research perspective on fog computing. In the International Conference on
Service-Oriented Computing (pp. 198-210). Springer, Cham.
[12] Abbasi, B. Z., & Shah, M. A. (2017, September). Fog computing: Security issues,
solutions and robust practices. In 2017 23rd International Conference on Automation and
Computing (ICAC) (pp. 1-6). IEEE.
[13] Bonomi, F., Milito, R., Zhu, J., & Addepalli, S. (2012, August). Fog computing and its
role in the internet of things. In Proceedings of the first edition of the MCC workshop on Mobile
cloud computing (pp. 13-16).
[14] Gia, T. N., Jiang, M., Rahmani, A. M., Westerlund, T., Liljeberg, P., & Tenhunen, H.
(2015, October). Fog computing in healthcare internet of things: A case study on ecg extraction
of features.
[15] Paul, A., Pinjari, H., Hong, W. H., Seo, H. C., & Rho, S. (2018). Fog computing-based
IoT for health monitoring systems. Journal of Sensors, 2018.
[16] Naas, M. I., Boukhobza, J., Parvedy, P. R., & Lemarchand, L. (2018, May). An extension
to ifogsim to enable the design of data placement strategies. In 2018 IEEE 2nd International
Conference on Fog and Edge Computing (ICFEC) (pp. 1-8). IEEE.
[17] Rao, T. V. N., Khan, A., Maschendra, M., & Kumar, M. K. (2015). A paradigm shift from
cloud to fog computing. International Journal of Science, Engineering and Computer
Technology, 5(11), 385.
[18] Menon, V. G., & Prathap, P. J. (2017). Moving from vehicular cloud computing to
vehicular fog computing: Issues and challenges. International Journal on Computer Science
and Engineering, 9(2), 14-18.
[19] Plebani, P., Garcia Perez, D., Anderson, M., Bermbach, D., Cappiello, C., Kat, R. I., ... &
Vitali, M. (2017). Information logistics and fog computing: The DITAS∗ approach. In Forum
and Doctoral Consortium Papers Presented at the 29th International Conference on Advanced
Page | 76
Information Systems Engineering, CAiSE-Forum-DC 2017 (pp. 129-136). CEUR WS.
[20] Abdelaziz, J., Adda, M., & Mcheick, H. (2018). An Architectural Model for Fog
Computing. J. Ubiquitous Syst. Pervasive Networks, 10(1), 21-25.
[22] Rao, Y. S., & Sree, K. B. (2018). A review on fog computing: conceptual live Vm
migration framework, issues, applications and its challenges. Int J Sci Res Comput Sci
Eng InfTechnol, 3(1), 1175-1184.
[23] Wang, Z., Guo, Y., Gao, Y., Fang, C., Li, M., & Sun, Y. (2020). Fog-Based
Distributed Networked Control for Connected Autonomous Vehicles. Wireless
Communications andMobile Computing, 2020.
[24] Amor, A. B., Abid, M., & Meddeb, A. (2020). Secure fog based e-learning scheme.
IEEEAccess, 8, 31920-31933.
[25] Hu, P., Ning, H., Qiu, T., Zhang, Y., & Luo, X. (2016). Fog computing based face
identification and resolution scheme in the internet of things. IEEE transactions on
industrial informatics, 13(4), 1910-1920.
[26] Ijaz, M., Li, G., Lin, L., Cheikhrouhou, O., Hamam, H., & Noor, A. (2021).
Integration and Applications of Fog Computing and Cloud Computing Based on the
Internet of Things forProvision of Healthcare Services at Home. Electronics, 10(9), 1077.
Page | 77
INTRODUCTION
LITERATURE SURVEY
SYSTEM REQUIREMENT
SPECIFICATION
SYSTEM DESIGN AND
ARCHITECTURE
IMPLEMENTATION
OUTPUT SNAPSHOTS
TESTING AND RESULT
CONCLUSION
REFERENCES
BASE PAPER