+234 813 0686 500
+234 809 3423 853
info@grossarchive.com

ANOMALY PATTERN DETECTION OF AN OUTBREAK DISEASE USING RULE BASED SYSTEM USING MENINGITIS AS A CASE STUDY.

  • Type:Project
  • Pages:89
  • Format:Microsoft Word
(Computer Science Project Topics & Materials)

CHAPTER ONE: INTRODUCTION

1.1       Background of The Study                                                                          1

1.2       Statement of The Problem                                                                         3

1.3       Aim and Objectives of The Study                                                              3

1.4       Research Questions                                                                                   4

1.5       Scope of The Study                                                                                     4

1.6       Research Methodology                                                                              4

1.7       Significance of The Study                                                                         5

1.8       Limitations of The Study                                                                             6

 

CHAPTER TWO: LITERATURE REVIEW

2.1       Overview on Meningitis                                                                              7

2.1.1   How Meningitis is Transmitted                                                                  8

2.1.2   Symptoms of Meningitis                                                                             9

2.1.3   Risk Factors for Meningitis                                                                                    9

2.1.4   How is Meningitis Diagnosed                                                                   10

2.1.5   How is Meningitis Treated                                                                          11

2.1.6   Prevention of Meningitis                                                                            11

2.2       Anomaly Detection                                                                                      13

2.2.1   Rule Based Expert Systems (RBR)                                                          13

2.2.1.1 Theory of Rule-Based Systems                                                               14

2.2.1.2   Rule-Based Reasoning                                                                           15

2.3       Overview on Expert Advisor System                                                        16

2.3.1   The Structure of Medical Expert Systems                                               17

2.3.2   Rule Based Expert System                                                                        18

2.3.3   Knowledge Based Expert System                                                            18

2.4       Artificial Intelligence (AI) and Clinical Guidelines                                 19

2.4.1   Group Decision Making                                                                              19

2.5       Overview On Expert System                                                                      20

2.6       Computer-Interpretable Guidelines                                                          21

2.6.1   Clinical Expert Systems                                                                              22

2.6.2   Importance of Clinical Expert Systems                                                    23

2.6.3   Clinician Motivation To Use Expert Systems                                          24

2.7       The Concept on Rule Based Approach in Expert System                   25

2.7.1   Obtaining Information for Developing Rules                                          26

 

CHAPTER THREE: SYSTEM ANALYSIS AND DESIGN

3.1       Analysis of The Existing System                                                              27

3.2       Problem with The Existing System                                                           28

3.3       Analysis of The Proposed System                                                            28

3.4       Benefits of The Proposed System                                                            29

3.5       System Design                                                                                             29

3.5.1   Preliminary Design Stage                                                                          29

3.5.2   Structural Design Stage                                                                             30

3.5.3   Program Design                                                                                           30

3.5.4   Interface Design                                                                                          30

3.5.5   Input/Output Design                                                                                    30

3.5.6   Input Design                                                                                                 31

3.5.7   Output Design                                                                                              35

3.6       Data Flow Diagram                                                                                      37

3.7       Database and Structure of Table                                                              39

3.8.      Entity Relationship Diagrams                                                                    42

3.9       Proposed System with UML                                                                       43

3.10    The Algorithm of Rule Based Expert System                                         47

 

CHAPTER FOUR: PROGRAMMING AND DOCUMENTATION

4.1       System Implementation                                                                              48

4.1.1   Functional Requirement                                                                            48

4.1.2   Non-Functional Requirement                                                                   48

4.2       Justification of Programming Language Used                                       50

4.3       Operating Procedures                                                                                 51

4.3.1   Program Installation                                                                                                51

4.3.2   Programmer’s Guide to Maintenance                                                      51

4.3.3   Personnel and Procedure                                                                          52

4.4       User Guide to The System                                                                         52

4.4.1   Running the Program                                                                                 52

4.4.2   Program Specification and Sub Programs                                              52

4.4.3   Change over process                                                                                  53

4.5       Documentation of The System                                                                  53

4.6       Statistical Analysis                                                                                      54

4.7       Hypothesis Formulation/Result and Discussion                                               54

4.7.1   Hypothesis Testing                                                                                      57

 

CHAPTER FIVE: SUMMARY, CONCLUSION AND RECOMMENDATION

5.1       Summary                                                                                                       60

5.2       Conclusion                                                                                                   61

5.3       Recommendation                                                                                        62

            References                                                                                                   69

 

 ABSTRACT

Detection of diseases are important, so as to stop them from infecting us. More so, outbreak diseases which cause epidemics. Traditional techniques for anomaly detection are unsatisfactory for this problem because they identify individual data points that are rare due to particular combinations of features. When applied to our scenario, these traditional algorithms discover isolated outliers of particularly strange events, such as an irrelevant event, that are not indicative of a new outbreak. Instead, we would like to detect anomalous patterns. These patterns are groups with specific characteristics whose recent pattern of illness is anomalous relative to historical patterns. We used a rule based anomaly detection algorithm that characterizes each anomalous pattern with a rule. The significance of each rule was carefully evaluated. Our algorithm is compared against a standard detection algorithm by measuring the number of false positives and the timeliness of detection. Simulated data, produced by a questionnaire that creates the effects of an epidemic on the respondent location, would be used for evaluation. The results outcomes indicate that our algorithm has significantly better detection times for common significance thresholds on meningitis.

 

 

ANOMALY PATTERN DETECTION OF AN OUTBREAK DISEASE USING RULE BASED SYSTEM USING MENINGITIS AS A CASE STUDY.

Share This

Details

Type Project
Department Computer Science
Project ID CPU1490
Price ₦3,000 ($9)
No of Pages 89 Pages
Format Microsoft Word

500
Leave a comment...

    Details

    Type Project
    Department Computer Science
    Project ID CPU1490
    Price ₦3,000 ($9)
    No of Pages 89 Pages
    Format Microsoft Word

    Related Works

    CHAPTER ONE: INTRODUCTION 1.1 Background of The Study 1 1.2 Statement of The Problem 3 1.3 Aim and Objectives of The Study 3 1.4 Research Questions 4 1.5 Scope of The Study 4 1.6 Research Methodology 4 1.7 Significance of The Study 5 1.8 Limitations of The Study 6 CHAPTER TWO: LITERATURE REVIEW 2.1 Overview on Meningitis 7 2.1.1 How Meningitis is... Continue Reading
    ABSTRACT This paper reports the design principles and evaluation results of a new experimental hybrid intrusion detection system (HIDS). This hybrid system combines the advantages of low false-positive rate of signature-based intrusion detection system (IDS) and the ability of anomaly detection system (ADS) to detect novel unknown attacks. By... Continue Reading
    ABSTRACT Neural Network Based Character Pattern Identification System has been one of the active and challenging research areas in the field of data computing, image processing and pattern recognition. It has numerous applications that includes, reading aid for blind, bank cheques and conversion of any hand written document into structural text... Continue Reading
    ABSTRACT This work is specially put together not to replace medical doctors or medical laboratory scientists but rather to assist them in accelerating in their diagnostic work which will go a long way to eliminate the trial and error method of treatment (which the doctors usually do while waiting for the lab result which would be detrimental to... Continue Reading
    ABSTRACT Banks deal essentially in cash financial instrument and other documents which are generally of a negotiable and easily transferable in nature. Hence it is very pertinent to say that the exposure of banks to both internal and external fraud is very great. This practice is very common to area involving cash, cheque and fraud transfer... Continue Reading
    ABSTRACT All investigation using samples are aimed at discovering some things about a particular population. The success of any sample lies in the accuracy with which it reflects the true state of affairs in the whole population. It is however known that it is highly impossible that such reflection would be 100% accurate when we draw a random... Continue Reading
    TABLE OF CONTENT Title page i Approval page ii Dedication iii Acknowledgement iv Table of content v Abstract vi CHAPTER ONE 1.0 Introduction historical background 1.1 Objective of the study 1.2 Statement of the problem 1.3 Significance of the researchers study 1.4 Scope of study 1.5 Limitation of study 1.6 Brief history of case study 1.7... Continue Reading
    ABSTRACT This project was centered on card based security system. The current process of security is being operated manually and due to this procedure numerous problem are been encountered. A design was taken to computerized the manual process in order to check this problem. The problems were identified after series of interviews and examination... Continue Reading
    ABSTRACT This project was centered on card based security system. The current process of security is being operated manually and due to this procedure numerous problem are been encountered. A design was taken to computerized the manual process in order to check this problem. The problems were identified after series of interviews and examination... Continue Reading
    ABSTRACT This project was centered on card based security system. The current process of security is being operated manually and due to this procedure numerous problem are been encountered. A design was taken to computerized the manual process in order to check this problem. The problems were identified after series of interviews and examination... Continue Reading