Various embodiments of the present invention address technical challenges related to performing predictive analysis and disclose innovative techniques for efficiently and effectively performing predictive data analysis operations using a hierarchical risk prediction machine learning framework.
In general, various embodiments of the present disclosure provide methods, apparatuses, systems, computing devices, computing entities, and/or the like for performing predictive data analysis operations using a hierarchical risk prediction machine learning framework. Certain embodiments of the present invention utilize systems, methods, and computer program products that perform predictive data analysis using initially-deployed risk prediction machine learning models, dynamically-deployed risk prediction machine learning models, and risk aggregation machine learning models.
In accordance with one aspect, a computer-implemented method for generating a predicted risk score for an input feature data object is provided. In one embodiment, the method comprises: generating, by one or more processors and based at least in part on the input feature data object, an input deidentified three-dimensional model; generating, by the one or more processors, based at least in part on the input deidentified three-dimensional model, and using a dynamically-deployed risk prediction machine learning model, the predicted risk score, wherein: the dynamically-deployed risk prediction machine learning model is deployed when a dynamic deployment training entry count of one or more dynamic deployment training entries satisfies a dynamic deployment training entry count threshold, the dynamically-deployed risk prediction machine learning model is trained using the one or more dynamic deployment training entries, each dynamic deployment training entry comprises a corresponding training entry deidentified three-dimensional model that is associated with a corresponding training entry feature data object and a corresponding dynamic deployment ground-truth indicator, each corresponding dynamic deployment ground-truth indicator of a corresponding dynamic deployment training entry is determined based at least in part on a corresponding recommendation validation indicator for a corresponding predicted recommendation that is generated based at least in part on an initial risk score, and each initial risk score is generated by an initially-deployed risk prediction machine learning model based at least in part on an identifiable feature data object for the corresponding dynamic deployment training entry; and performing, by the one or more processors, one or more prediction-based actions based at least in part on the predicted risk score.
In accordance with another aspect, an apparatus for generating a predicted risk score for an input feature data object is provided. The apparatus may comprise at least one processor and at least one memory including computer program code is provided. In one embodiment, the at least one memory and the computer program code may be configured to, with the processor, cause the apparatus to: generate, based at least in part on the input feature data object, an input deidentified three-dimensional model; generate, based at least in part on the input deidentified three-dimensional model, and using a dynamically-deployed risk prediction machine learning model, the predicted risk score, wherein: the dynamically-deployed risk prediction machine learning model is deployed when a dynamic deployment training entry count of one or more dynamic deployment training entries satisfies a dynamic deployment training entry count threshold, the dynamically-deployed risk prediction machine learning model is trained using the one or more dynamic deployment training entries, each dynamic deployment training entry comprises a corresponding training entry deidentified three-dimensional model that is associated with a corresponding training entry feature data object and a corresponding dynamic deployment ground-truth indicator, each corresponding dynamic deployment ground-truth indicator of a corresponding dynamic deployment training entry is determined based at least in part on a corresponding recommendation validation indicator for a corresponding predicted recommendation that is generated based at least in part on an initial risk score, and each initial risk score is generated by an initially-deployed risk prediction machine learning model based at least in part on an identifiable feature data object for the corresponding dynamic deployment training entry; and perform one or more prediction-based actions based at least in part on the predicted risk score.
In accordance with yet another aspect, a computer program product for generating a predicted risk score for an input feature data object is provided. The computer program product may comprise at least one computer-readable storage medium having computer-readable program code portions stored therein, the computer-readable program code portions comprising executable portions configured to: generate, based at least in part on the input feature data object, an input deidentified three-dimensional model; generate, based at least in part on the input deidentified three-dimensional model, and using a dynamically-deployed risk prediction machine learning model, the predicted risk score, wherein: the dynamically-deployed risk prediction machine learning model is deployed when a dynamic deployment training entry count of one or more dynamic deployment training entries satisfies a dynamic deployment training entry count threshold, the dynamically-deployed risk prediction machine learning model is trained using the one or more dynamic deployment training entries, each dynamic deployment training entry comprises a corresponding training entry deidentified three-dimensional model that is associated with a corresponding training entry feature data object and a corresponding dynamic deployment ground-truth indicator, each corresponding dynamic deployment ground-truth indicator of a corresponding dynamic deployment training entry is determined based at least in part on a corresponding recommendation validation indicator for a corresponding predicted recommendation that is generated based at least in part on an initial risk score, and each initial risk score is generated by an initially-deployed risk prediction machine learning model based at least in part on an identifiable feature data object for the corresponding dynamic deployment training entry; and perform one or more prediction-based actions based at least in part on the predicted risk score.
Having thus described the invention in general terms, reference will now be made to the accompanying drawings, which are not necessarily drawn to scale, and wherein:
Various embodiments of the present disclosure now will be described more fully hereinafter with reference to the accompanying drawings, in which some, but not all embodiments are shown. Indeed, various configurations as discussed herein may be embodied in many different forms and should not be construed as limited to the embodiments set forth herein; rather, these embodiments are provided so that this disclosure will satisfy applicable legal requirements. The term “or” (also designated as “I”) is used herein in both the alternative and conjunctive sense, unless otherwise indicated. The terms “illustrative” and “exemplary” are used to be examples with no indication of quality level. Like numbers refer to like elements throughout. Moreover, while certain embodiments of the present invention are described with reference to predictive data analysis, one of ordinary skill in the art will recognize that the disclosed concepts can be used to perform other types of data analysis.
Various embodiments of the present invention describe techniques for increasing efficiency of machine learning frameworks while maintaining the outputs of the machine learning frameworks within a desired threshold accuracy/reliability range. For example, in some embodiments, a hierarchical machine learning framework includes an initially-deployed component and a dynamically-deployed component, where the initially-deployed component is trained using training data that is available before deployment of the hierarchical machine learning framework but is expected to be less accurate, while the dynamically-deployed component is trained using training data that is available after deployment of the hierarchical machine learning framework but is expected to be more accurate. This approach ensures that, before the training data for the dynamically-deployed component is available, the hierarchical machine learning framework only comprises the initially-deployed component and thus avoids the need for performing computational instructions associated with executing operations of the dynamically-deployed component of the hierarchical machine learning framework. In this way, by disclosing a hierarchical machine learning framework including an initially-deployed component and a dynamically-deployed component, various embodiments of the present invention introduce techniques for increasing efficiency of machine learning frameworks while maintaining the outputs of the machine learning frameworks within a desired threshold accuracy/reliability range.
Various embodiments of the present invention improve data security of implementing machine learning frameworks using a client-server architecture, where the input features of a machine learning framework are provided by a client device to a predictive data analysis server system. For example, in some embodiments, at least part of the input data provided by the client device (e.g., image/video data associated with an identifiable feature data object) are removed after performing predictive inferences and thus not permanently maintained. In some embodiments, an input feature data object is associated with an identifiable feature data object that is removed from a storage subsystem associated with a predictive data analysis system after generating a predictive output (e.g., an initial risk and/or a predicted risk score) based at least in part on the input feature data object. In some embodiments, an input feature data object is associated with a deidentified three-dimensional model that is permanently stored and/or not removed from a storage subsystem associated with a predictive data analysis system after generating a predictive output (e.g., an initial risk and/or a predicted risk score) based at least in part on the input feature data object. In some embodiments, the deidentified three-dimensional model is used as input data for a dynamically-deployed component of a machine learning framework, while the identifiable feature data object is used as input data for an initially-deployed component of the machine learning framework. In this way, if the predictive data analysis system is compromised, only permanently-stored data (e.g., de-identified data) are comprised, while identifiable data are not compromised. In this way, by ensuring that at least part of the input data provided by the client device (e.g., image/video data associated with an identifiable feature data object) are removed after performing predictive inferences and thus not permanently maintained, various embodiments of the present invention improve data security of implementing machine learning frameworks using a client-server architecture, where the input features of a machine learning framework are provided by a client device to a predictive data analysis server system.
Various embodiments of the present invention introduce techniques for improving operational reliability and computational efficiency of predictive data analysis solutions by using a hierarchical risk prediction machine learning framework. As further described herein, a hierarchical risk prediction machine learning framework may generate predictive outputs using an initially-deployed risk prediction machine learning model and use the outputs of the initially-deployed risk prediction machine learning model to generate training data for a dynamically-deployed risk prediction machine learning model. Additionally, the hierarchical risk prediction machine learning framework may include a risk aggregation machine learning model that is configured to generate a final predictive output based at least in part on intermediary outputs generated by other machine learning models. In some embodiments, the outputs generated by the initially-deployed risk prediction machine learning model may be anonymized and deidentified to provide comprehensive training data that excludes personally identifiable information (PII). Additionally, using the noted hierarchical framework, deployment of the dynamically-deployed risk prediction machine learning model may be deferred until a target performance threshold is reached. Accordingly, by using a hierarchical risk prediction machine learning framework, various embodiments of the present invention optimize and improve the process of training risk prediction machine learning models while facilitating generation of useful predictive outputs during the training process. Thus, the solutions described herein improve operational reliability and computational efficiency of risk prediction data analysis solutions.
Various embodiments of the present invention disclose techniques for more efficiently and reliably performing predictive data analysis. For example, various embodiments of the present invention disclose techniques for performing predictive data analysis operations utilizing a hierarchical risk prediction machine learning framework. For example, according to some embodiments of the present invention, predictive data analysis using a hierarchical risk prediction machine learning framework can be performed by: (i) generating an initial risk score associated with an input feature data object using an initially-deployed risk prediction machine learning model of the hierarchical risk prediction machine learning framework, (ii) generating an adjusted risk score associated with an input feature data object using a dynamically-deployed risk prediction machine learning model of the hierarchical risk prediction machine learning framework, (iii) generating a predicted risk score using a risk aggregation machine learning model of the hierarchical risk prediction machine learning framework based at least in part on the initial risk score and the adjusted risk score, and (iv) performing one or more prediction-based actions based at least in part on the predicted risk score.
In some embodiments, the dynamically-deployed risk prediction machine learning model of the hierarchical risk prediction machine learning framework utilizes training data and prediction operations that may, in at least some embodiments, reduce or eliminate the need for deferring the deployment of a predictive data analysis solution due to computationally expensive and extensive training operations. By deploying certain components of the hierarchical risk prediction machine learning framework while performing training operations, various embodiments of the present invention improve the computational efficiency of performing predictive data analysis. Via the noted advantages, various embodiments of the present invention make substantial technical contributions to the fields of predictive data analysis in particular and healthcare-related predictive data analysis in general.
An exemplary application of various embodiments of the proposed invention relates to predicting rare disease (RD) with respect to individuals (e.g., children) based at least in part on image/video sensor data, patient medical history, and the like. A great challenge for RD patients is a long journey to diagnosis, sometime referred to as a diagnostic odyssey (DO), which may be costly, time consuming, and difficult for patients and family members alike to navigate. For example, there are approximately 7,000 different known RDs (e.g., hemophilia, sickle cell, and muscular dystrophy) and identifying the cause of a patient's affliction may prove extremely challenging.
An exemplary application of various embodiments of the proposed invention relates to a “virtual triage” application (app), that utilizes deep learning and computer vision techniques to provide a mechanism to reduce the length of a DO, and thus ameliorate the burden faced by patients and their families. The techniques discloses herein provide a framework for concerned parents to be guided by an app, enabling them to “raise their hand” and infer if their child may have a RD, before being connected to a specialist, or a Centre of Excellence (CoE). Consequently, the invention may reduce the length of the DO in the case of a candidate RD patient and provides techniques to help address the challenges described above.
Another exemplary application of various embodiments of the proposed invention relates to a diagnostic support tool (e.g., a physician may ask a parent to download an app and walk through a protocol). In some embodiments, aspects of the present invention enable a user to obtain a diagnosis, identify specialists, obtain medical instructions, plan a consultation, understand a prognosis, identify risks for other family members, and provide a community for patients with similar diagnoses.
The term “body” may refer to a person's physical form, and the term may specifically be utilized to refer to a portion of a person's body, including at least a portion of one or more internal and/or external organs of a user. In general, the terms user, patient, wearer, individual, person and/or similar words are used herein interchangeably.
The term “predictive entity” may refer to a data object that describes an entity with respect to which one or more predictive tasks/operations are performed. In some embodiments, a predictive entity may refer to a data object that describes an individual (e.g., child, patient, member, or the like). The individual may be associated with a health insurance insurer and may be considered a member of a program associated with the health insurance insurer. An example predictive entity may correspond with an identifier (e.g., patient name, member ID, and/or the like).
The term “initially-deployed risk prediction machine learning model” may refer to a data object that describes operations, parameters, and/or hyperparameters of a machine learning model that is configured to process an identifiable feature data object (e.g., comprising image and/or video sensor data) of a predictive entity in order to generate a predictive output for the predictive output. An example output from the initially-deployed risk determination machine learning model may be or comprise an initial risk score. In some embodiments, the initially-deployed risk determination machine learning model may be used prior to the deployment of a dynamically-deployed risk prediction machine learning model (e.g., in an instance in which a dynamic deployment training entry count of one or more dynamic deployment training entries fails to satisfy a dynamic deployment training entry count threshold). In some embodiments, the output of an initially-deployed risk prediction machine learning model may be used to generate training data (e.g., training entry deidentified three-dimensional models) for training a dynamically-deployed risk prediction machine learning model. An example of an initially-deployed risk determination machine learning model is a trained supervised machine learning model (e.g., a trained supervised regression model, a convolutional neural network model, and/or the like) and/or an image-based classification machine learning component.
The term “identifiable feature data object” may refer to a data object that describes identifiable features associated with an individual including, but not limited to, a three-dimensional movement profile, one or more three-dimensional body-related characteristics, patient information/data (e.g., historical claim data), contextual features associated with an individual/related entities (e.g., from medical data and/or social media data), based at least in part on an operational context of a machine learning model (e.g., physical environment of the image/video data associated with the identifiable feature data object), and/or the like. In some embodiments, an identifiable feature data object may be an example input for an initially-deployed risk prediction machine learning model.
The term “input feature data object” may refer to a data object that describes features associated with a predictive entity such as an individual, and with respect to which one or more predictive tasks/operations are performed. In some embodiments, an input feature data object may refer to a data object that describes features of a patient, member, or the like. In various embodiments, an input feature data object may be used to generate or may be associated with an identifiable feature data object and/or an input deidentified three-dimensional model, which in turn may be used to determine a predicted risk score. In some embodiments, an input feature data object is associated with an identifiable feature data object that is removed from a storage subsystem associated with a predictive data analysis system after generating a predictive output (e.g., an initial risk and/or a predicted risk score) based at least in part on the input feature data object. In some embodiments, an input feature data object is associated with a deidentified three-dimensional model that is permanently stored and/or not removed from a storage subsystem associated with a predictive data analysis system after generating a predictive output (e.g., an initial risk and/or a predicted risk score) based at least in part on the input feature data object.
The term “initial risk score” may refer to a data object that describes a predictive output of one or more computer-implemented processes, wherein the predictive output describes an inferred measure of risk with respect to an identifiable feature data object. In some embodiments, the predicted risk score may be related to whether an individual is likely to have a rare disease and/or should be referred for a rare disease screening/investigation (e.g., Deoxyribonucleic Acid (DNA) sequencing/testing, clinician review, and/or the like). The example initial risk score may be an output of an initially-deployed risk prediction machine learning model (e.g., the initially-deployed risk prediction machine learning model may be used in an instance in which a dynamic deployment training entry count of one or more dynamic deployment training entries fails to satisfy a dynamic deployment training entry count threshold). In some embodiments, the initial risk score may be an intermediary output of a hierarchical risk prediction machine learning framework that comprises a plurality of machine learning models.
The term “dynamically-deployed risk prediction machine learning model” may refer to a data object that describes operations, parameters, and/or hyperparameters of a machine learning model that is configured to process an input feature data object in order to generate an input deidentified three-dimensional model that can be used to generate a predicted risk score. In some embodiments, the dynamically-deployed risk determination machine learning model may be trained using one or more dynamic deployment training entries where each dynamic deployment training entry comprises a corresponding training entry deidentified three-dimensional model that is associated with a corresponding training entry feature data object and a corresponding dynamic deployment ground-truth indicator. In some embodiments, the dynamically-deployed risk prediction machine learning model is deployed in response to determining that a dynamic deployment training entry count of one or more dynamic deployment training entries satisfies a dynamic deployment training entry count threshold. In some embodiments, each corresponding dynamic deployment ground-truth indicator of a corresponding dynamic deployment training entry is determined based at least in part on a corresponding recommendation validation indicator for a corresponding predicted recommendation that may be generated based at least in part on/associated with an initial risk score. An example of a dynamically-deployed risk determination machine learning model is a trained supervised machine learning model (e.g., a trained supervised regression model, a convolutional neural network model, and/or the like) and/or an image-based classification machine learning component. In some embodiments, an example input to the dynamically-deployed risk prediction machine learning model may be or comprise an input feature data object. An example output from the dynamically-deployed risk determination machine learning model may be or comprise a predicted risk score. The operations of the dynamically-deployed risk determination machine learning model may lead to performing one or more prediction-based actions or tasks.
The term “adjusted risk score” may refer to a data object that describes a predictive output of one or more computer-implemented processes, wherein the predictive output describes an inferred measure of risk with respect to an input deidentified three-dimensional model. The adjusted risk score may be used to generate a predicted risk score. In some embodiments, the predicted risk score may be related to whether an individual is likely to have a rare disease and/or should be referred for a rare disease screening/investigation. The example initial risk score may be an output of a dynamically-deployed risk prediction machine learning model where the dynamically-deployed risk prediction machine learning model is used in an instance in which a dynamic deployment training entry count of one or more dynamic deployment training entries satisfies a dynamic deployment training entry count threshold. In some embodiments, the adjusted risk score may be an intermediary output of a hierarchical risk prediction machine learning framework that comprises a plurality of machine learning models.
The term “risk aggregation machine learning model” may refer to a data object that describes operations, parameters, and/or hyperparameters of a machine learning model that is configured to process an initial risk score and an adjusted risk score in order to generate a predicted risk score. In some embodiments, the initial risk score is an output of an initially-deployed risk prediction machine learning model, and the adjusted risk score is an output of a dynamically-deployed risk prediction machine learning model. In some embodiments, the risk aggregation machine learning model is a supervised machine learning model or an unsupervised machine learning model (e.g., a clustering model). In some embodiments, inputs to the risk aggregation machine learning model comprise a vector describing the initial risk score and the adjusted risk score, while outputs of the risk aggregation machine learning model comprise a vector describing the predicted risk score.
The term “predicted risk score” may refer to a data object that describes a predictive output of one or more computer-implemented processes, wherein the predictive output describes an inferred measure of risk with respect to an input feature data object and/or input deidentified three-dimensional model. In some embodiments, the predicted risk score may be related to whether or an individual that is associated with the input feature data object is likely to have a rare disease and/or should be referred for a rare disease screening/investigation (e.g., DNA sequencing/testing, clinician review, and/or the like). By way of example, the predicted risk score may be a value where an above-threshold value indicates that a particular individual is likely to have a rare disease and/or should be referred for a rare disease screening/investigation. The example predicted risk score may be generated using an initially-deployed risk prediction machine learning model and/or a dynamically-deployed risk prediction machine learning model (in some embodiments, based at least in part on an initial risk score and/or an adjusted risk score) and may be used to perform one or more prediction-based actions with respect to the input feature data object. In some embodiments, the predicted risk score may be a final output of a hierarchical risk prediction machine learning framework that comprises a plurality of machine learning models.
The term “dynamic deployment training entry count threshold” may refer a parameter, condition, value, or the like that defines count of dynamic deployment training entries that must be satisfied in order to trigger deployment of a dynamically-deployed risk determination machine learning model. In some embodiments, an example dynamic deployment training entry may be or comprise a data object that describes or is otherwise associated with a training entry deidentified three-dimensional model that can be used to train a dynamically-deployed risk determination machine learning model.
The term “input deidentified three-dimensional model” may refer to a data object that describes a predictive output of one or more computer-implemented processes, wherein the predictive output describes a deidentified three-dimensional movement profile and/or one or more three-dimensional body related characteristics. In some embodiments, an input deidentified three-dimensional model may be associated with a dynamic deployment training entry. In some embodiments, an example input deidentified three-dimensional model may be generated based at least in part on an input feature data object describing identifiable features of an individual (e.g., patient, member, or the like).
The term “three-dimensional movement profile” may refer to a data object that describes a predictive output of one or more computer-implemented processes, wherein the predictive output describes at least one movement feature set describing a three-dimensional representation of an individual's gait. In some embodiments, a three-dimensional movement profile may be generated based at least in part on image/video sensor data associated with an individual.
The term “three-dimensional body-related characteristics” may refer to a data object that describes at least one feature set describing a three-dimensional representation of an individual's physical characteristics. In various embodiments, three-dimensional body-related characteristics may include holistic characteristics, head and face characteristics, posture, muscle tone, and arm and hand characteristics. In some embodiments, three-dimensional body-related characteristics may be determined based at least in part on image/video sensor data associated with an individual.
The term “deidentified three-dimensional model” may refer to a data object that describes an anonymized/deidentified three-dimensional model/representation (e.g., comprising a deidentified three-dimensional movement profile and/or one or more three-dimensional body-related characteristics). For example, a dynamic deployment training entry may comprise a training entry deidentified three-dimensional model that is in turn associated with a corresponding training entry feature data object and a corresponding dynamic deployment ground-truth indicator. In some embodiments, a training entry deidentified three-dimensional model may be used as input to train a dynamically-deployed risk determination machine learning model.
The term “dynamic deployment ground-truth indicator” may refer to a data object that describes a validated outcome of a rare disease screening or investigation. In some embodiments, the dynamic deployment ground-truth indicator may be or comprise a determined recommendation validation indicator with respect to a training entry feature data object. For example, a dynamic deployment ground-truth indicator may be associated with a training entry feature data object describing features/attributes of a deidentified individual that is diagnosed as having a rare disease (e.g., as a result of a recommended rare disease screening/investigation).
The term “recommendation validation indicator” may refer to a data object that describes a determination relating to a degree of correspondence between a risk score (e.g., initial risk score or predicted risk score) associated with a predicted recommendation and a validated outcome of a rare disease screening/investigation. By way of example, if a predicted risk score/initial risk score is an above-threshold value (e.g., indicating that an individual is likely to have a rare disease and/or should be referred for a rare disease screening/investigation) and the outcome of a subsequent rare disease screening/investigation is positive (i.e., the individual is diagnosed by a clinician as having a rare disease), then the recommendation validation indicator may be positive. Similarly, if the predicted risk score/initial risk score is a below-threshold value (e.g., indicating that the individual is not likely to have a rare disease and should not be referred for a rare disease screening/investigation) and the outcome of a subsequent rare disease screening/investigation is negative (i.e., the individual is not diagnosed by a clinician as having a rare disease), then the recommendation validation indicator may also be positive. Conversely, if the predicted risk score/initial risk score is a below-threshold value (e.g., indicating that the individual is not likely to have a rare disease and should not be referred for a rare disease screening/investigation) and the outcome of a subsequent rare disease screening/investigation is positive (i.e., the individual is diagnosed by a clinician as having a rare disease), then the recommendation validation indicator may be negative.
The term “patient profile” may refer to a data object storing and/or providing access to information/data associated with a patient/individual. The patient profile may also comprise member information/data, member features, and/or similar words used herein interchangeably that can be associated with a given member identifier for a patient/individual, claim, and/or the like. In some embodiments, member information/data can include age, gender, known health conditions, home location, medical history, claim history, member identifier (ID), and/or the like.
The term “sensor data” may refer to user information/data, physiological information/data, biometric information/data, location information/data, environmental information/data, image/video sensor information/data, and/or the like which may be associated with a particular individual. Sensor data may be collected and/or generated by one or more sensors associated with the user, such as mobile device sensors, wearable device sensors, sensors associated with one or more devices commonly used by the user, and/or the like. In some embodiments, the sensor data may include image data, muscle condition data, heart rate data, oxygen saturation data, pulse rate data, body temperature data, breath rate data, perspiration data, blink rate data, blood pressure data, neural activity data, cardiovascular data, pulmonary data, and/or various other types of information/data. In some embodiments, sensor data may be stored in conjunction with a user profile and/or input feature data object.
The term “electronically coupled” or “in electronic communication with” may refer to two or more electrical elements (for example, but not limited to, an example processing circuitry, communication module, input/output module memory, plurality of independent foot stimulation sections) and/or electric circuit(s) being connected through wired means (for example but not limited to, conductive wires or traces) and/or wireless means (for example but not limited to, wireless network, electromagnetic field), such that data and/or information (for example, electronic indications, signals) may be transmitted to and/or received from the electrical elements and/or electric circuit(s) that are electronically coupled.
Embodiments of the present disclosure may be implemented in various ways, including as computer program products that comprise articles of manufacture. Such computer program products may include one or more software components including, for example, software objects, methods, data structures, and/or the like. A software component may be coded in any of a variety of programming languages. An illustrative programming language may be a lower-level programming language such as an assembly language associated with a particular hardware architecture and/or operating system platform. A software component comprising assembly language instructions may require conversion into executable machine code by an assembler prior to execution by the hardware architecture and/or platform. Another example programming language may be a higher-level programming language that may be portable across multiple architectures. A software component comprising higher-level programming language instructions may require conversion to an intermediate representation by an interpreter or a compiler prior to execution.
Other examples of programming languages include, but are not limited to, a macro language, a shell or command language, a job control language, a script language, a database query or search language, and/or a report writing language. In one or more example embodiments, a software component comprising instructions in one of the foregoing examples of programming languages may be executed directly by an operating system or other software component without having to be first transformed into another form. A software component may be stored as a file or other data storage construct. Software components of a similar type or functionally related may be stored together such as, for example, in a particular directory, folder, or library. Software components may be static (e.g., pre-established or fixed) or dynamic (e.g., created or modified at the time of execution).
A computer program product may include a non-transitory computer-readable storage medium storing applications, programs, program modules, scripts, source code, program code, object code, byte code, compiled code, interpreted code, machine code, executable instructions, and/or the like (also referred to herein as executable instructions, instructions for execution, computer program products, program code, and/or similar terms used herein interchangeably). Such non-transitory computer-readable storage media include all computer-readable media (including volatile and non-volatile media).
In some embodiments, a non-volatile computer-readable storage medium may include a floppy disk, flexible disk, hard disk, solid-state storage (SSS) (e.g., a solid state drive (SSD), solid state card (SSC), solid state module (SSM), enterprise flash drive, magnetic tape, or any other non-transitory magnetic medium, and/or the like. A non-volatile computer-readable storage medium may also include a punch card, paper tape, optical mark sheet (or any other physical medium with patterns of holes or other optically recognizable indicia), compact disc read only memory (CD-ROM), compact disc-rewritable (CD-RW), digital versatile disc (DVD), Blu-ray disc (BD), any other non-transitory optical medium, and/or the like. Such a non-volatile computer-readable storage medium may also include read-only memory (ROM), programmable read-only memory (PROM), erasable programmable read-only memory (EPROM), electrically erasable programmable read-only memory (EEPROM), flash memory (e.g., Serial, NAND, NOR, and/or the like), multimedia memory cards (MMC), secure digital (SD) memory cards, SmartMedia cards, CompactFlash (CF) cards, Memory Sticks, and/or the like. Further, a non-volatile computer-readable storage medium may also include conductive-bridging random access memory (CBRAM), phase-change random access memory (PRAM), ferroelectric random-access memory (FeRAM), non-volatile random-access memory (NVRAM), magnetoresistive random-access memory (MRAM), resistive random-access memory (RRAM), Silicon-Oxide-Nitride-Oxide-Silicon memory (SONOS), floating junction gate random access memory (FJG RAM), Millipede memory, racetrack memory, and/or the like.
In some embodiments, a volatile computer-readable storage medium may include random access memory (RAM), dynamic random access memory (DRAM), static random access memory (SRAM), fast page mode dynamic random access memory (FPM DRAM), extended data-out dynamic random access memory (EDO DRAM), synchronous dynamic random access memory (SDRAM), double data rate synchronous dynamic random access memory (DDR SDRAM), double data rate type two synchronous dynamic random access memory (DDR2 SDRAM), double data rate type three synchronous dynamic random access memory (DDR3 SDRAM), Rambus dynamic random access memory (RDRAM), Twin Transistor RAM (TTRAM), Thyristor RAM (T-RAM), Zero-capacitor (Z-RAM), Rambus in-line memory module (RIMM), dual in-line memory module (DIMM), single in-line memory module (SIMM), video random access memory (VRAM), cache memory (including various levels), flash memory, register memory, and/or the like. It will be appreciated that where embodiments are described to use a computer-readable storage medium, other types of computer-readable storage media may be substituted for or used in addition to the computer-readable storage media described above.
As should be appreciated, various embodiments of the present disclosure may also be implemented as methods, apparatus, systems, computing devices, computing entities, and/or the like. As such, embodiments of the present disclosure may take the form of a data structure, apparatus, system, computing device, computing entity, and/or the like executing instructions stored on a computer-readable storage medium to perform certain steps or operations. Thus, embodiments of the present disclosure may also take the form of an entirely hardware embodiment, an entirely computer program product embodiment, and/or an embodiment that comprises combination of computer program products and hardware performing certain steps or operations.
Embodiments of the present disclosure are described below with reference to block diagrams and flowchart illustrations. Thus, it should be understood that each block of the block diagrams and flowchart illustrations may be implemented in the form of a computer program product, an entirely hardware embodiment, a combination of hardware and computer program products, and/or apparatus, systems, computing devices, computing entities, and/or the like carrying out instructions, operations, steps, and similar words used interchangeably (e.g., the executable instructions, instructions for execution, program code, and/or the like) on a computer-readable storage medium for execution. For example, retrieval, loading, and execution of code may be performed sequentially such that one instruction is retrieved, loaded, and executed at a time. In some exemplary embodiments, retrieval, loading, and/or execution may be performed in parallel such that multiple instructions are retrieved, loaded, and/or executed together. Thus, such embodiments can produce specifically-configured machines performing the steps or operations specified in the block diagrams and flowchart illustrations. Accordingly, the block diagrams and flowchart illustrations support various combinations of embodiments for performing the specified instructions, operations, or steps.
In some embodiments, the one or more risk prediction computing entities 10 are configured to receive data from one or more user computing entities 20/wearable devices (e.g., client computing entities) and process the data to generate predictive outputs (e.g., predicted risk scores) and provide the outputs to the client computing entities (e.g., for generating user interface data and/or dynamically updating a user interface). The one or more risk prediction computing entities 10 may be configured to receive queries, requests and/or data from client computing entities, process the queries, requests and/or data to generate predictive outputs, and provide (e.g., transmit, send, and/or the like) the predictive outputs to the client computing entities. The one or more risk prediction computing entities 10 may include a storage subsystem that is configured to store at least a portion of the data (e.g., operational instructions and parameters) utilized by the one or more risk prediction computing entity 10 to perform risk prediction operations and tasks. The risk prediction computing entity 10 may include one or more storage units, such as multiple distributed storage units that are connected through a computer network. Each storage unit in the storage subsystem may store at least one of one or more data assets and/or one or more data about the computed properties of one or more data assets. Moreover, each storage unit in the storage subsystem may include one or more non-volatile storage or memory media including but not limited to hard disks, ROM, PROM, EPROM, EEPROM, flash memory, MMCs, SD memory cards, Memory Sticks, CBRAM, PRAM, FeRAM, NVRAM, MRAM, RRAM, SONOS, FJG RAM, Millipede memory, racetrack memory, and/or the like.
As further depicted in
As indicated, in some embodiments, the risk prediction computing entity 10 may also include one or more network and/or communications interfaces 220 for communicating with various computing entities, such as by communicating data, content, information, and/or similar terms used herein interchangeably that can be transmitted, received, operated on, processed, displayed, stored, and/or the like.
As shown in
In some embodiments, the risk prediction computing entity 10 may further include or be in communication with non-volatile media (also referred to as non-volatile storage, memory, memory storage, memory circuitry and/or similar terms used herein interchangeably). In some embodiments, the non-volatile storage or memory may include one or more non-volatile storage or memory media 210 as described above, such as hard disks, ROM, PROM, EPROM, EEPROM, flash memory, MMCs, SD memory cards, Memory Sticks, CBRAM, PRAM, FeRAM, RRAM, SONOS, racetrack memory, and/or the like. As will be recognized, the non-volatile storage or memory media may store databases, database instances, database management system entities, data, applications, programs, program modules, scripts, source code, object code, byte code, compiled code, interpreted code, machine code, executable instructions, and/or the like. The term database, database instance, database management system entity, and/or similar terms used herein interchangeably may refer to a structured collection of records or information/data that is stored in a computer-readable storage medium, such as via a relational database, hierarchical database, and/or network database.
In some embodiments, the risk prediction computing entity 10 may further include or be in communication with volatile media (also referred to as volatile storage, memory, memory storage, memory circuitry and/or similar terms used herein interchangeably). In some embodiments, the volatile storage or memory may also include one or more volatile storage or memory media 215 as described above, such as RAM, DRAM, SRAM, FPM DRAM, EDO DRAM, SDRAM, DDR SDRAM, DDR2 SDRAM, DDR3 SDRAM, RDRAM, RIMM, SIMM, VRAM, cache memory, register memory, and/or the like. As will be recognized, the volatile storage or memory media may be used to store at least portions of the databases, database instances, database management system entities, data, applications, programs, program modules, scripts, source code, object code, byte code, compiled code, interpreted code, machine code, executable instructions, and/or the like being executed by, for example, the processing element 205. Thus, the databases, database instances, database management system entities, data, applications, programs, program modules, scripts, source code, object code, byte code, compiled code, interpreted code, machine code, executable instructions, and/or the like may be used to control certain aspects of the operation of the risk prediction computing entity 10 with the assistance of the processing element 205 and the operating system.
As indicated, in some embodiments, the risk prediction computing entity 10 may also include one or more network and/or communications interfaces 220 for communicating with various computing entities, such as by communicating data, content, information, and/or similar terms used herein interchangeably that can be transmitted, received, operated on, processed, displayed, stored, and/or the like. Such communication may be executed using a wired data transmission protocol, such as fiber distributed data interface (FDDI), digital subscriber line (DSL), Ethernet, asynchronous transfer mode (ATM), frame relay, data over cable service interface specification (DOCSIS), or any other wired transmission protocol. Similarly, risk prediction computing entity 10 may be configured to communicate via wireless external communication networks using any of a variety of protocols, such as general packet radio service (GPRS), Universal Mobile Telecommunications System (UMTS), Code Division Multiple Access 200 (CDMA200), CDMA200 1× (1×RTT), Wideband Code Division Multiple Access (WCDMA), Global System for Mobile Communications (GSM), Enhanced Data rates for GSM Evolution (EDGE), Time Division-Synchronous Code Division Multiple Access (TD-SCDMA), Long Term Evolution (LTE), Evolved Universal Terrestrial Radio Access Network (E-UTRAN), Evolution-Data Optimized (EVDO), High Speed Packet Access (HSPA), High-Speed Downlink Packet Access (HSDPA), IEEE 802.11 (Wi-Fi), Wi-Fi Direct, 802.16 (WiMAX), ultra-wideband (UWB), IR protocols, NFC protocols, RFID protocols, IR protocols, ZigBee protocols, Z-Wave protocols, 6LoWPAN protocols, Wibree, Bluetooth protocols, wireless universal serial bus (USB) protocols, and/or any other wireless protocol. The risk prediction computing entity 10 may use such protocols and standards to communicate using Border Gateway Protocol (BGP), Dynamic Host Configuration Protocol (DHCP), Domain Name System (DNS), File Transfer Protocol (FTP), Hypertext Transfer Protocol (HTTP), HTTP over TLS/SSL/Secure, Internet Message Access Protocol (IMAP), Network Time Protocol (NTP), Simple Mail Transfer Protocol (SMTP), Telnet, Transport Layer Security (TLS), Secure Sockets Layer (SSL), Internet Protocol (IP), Transmission Control Protocol (TCP), User Datagram Protocol (UDP), Datagram Congestion Control Protocol (DCCP), Stream Control Transmission Protocol (SCTP), HyperText Markup Language (HTML), and/or the like.
As will be appreciated, one or more of the risk prediction computing entity's components may be located remotely, such as in a distributed system. Furthermore, one or more of the components may be aggregated and additional components performing functions described herein may be included in the risk prediction computing entity 10. Thus, the risk prediction computing entity 10 can be adapted to accommodate a variety of needs and circumstances, such as including various components described with regard to a mobile application executing on the user computing entity 20, including various input/output interfaces.
The exemplary user computing entity 20 may be in communication with the risk prediction computing entity 10 and the wearable device 40. The user computing entity 20 may obtain and provide (e.g., transmit/send) data objects describing raw data (e.g., sensor data and/or physiological data associated with the user) obtained by one or more additional sensors or sensing devices, captured by another user computing entity 20 or device and/or provided by another computing entity. The user computing entity 20 may be configured to provide (e.g., transmit, send) data objects describing at least a portion of the sensor data and/or physiological data to the risk prediction computing entity 10. Additionally, in various embodiments, a remote computing entity may provide data objects describing user information/data to the risk prediction computing entity 10. In some embodiments, a user (e.g., wearer) of the wearable device 40 may operate the wearable device 40 via the display 316 or keypad 318 of the user computing entity 20. In some embodiments, another person may operate the wearable device 40 on behalf of the individual (e.g., child).
As shown in
In this regard, the user computing entity 20 may be capable of operating with one or more air interface standards, communication protocols, modulation types, and access types. More particularly, the user computing entity 20 may operate in accordance with any number of wireless communication standards and protocols. In a particular embodiment, the user computing entity 20 may operate in accordance with multiple wireless communication standards and protocols, such as GPRS, UMTS, CDMA200, 1×RTT, WCDMA, TD-SCDMA, LTE, E-UTRAN, EVDO, HSPA, HSDPA, Wi-Fi, WiMAX, UWB, IR protocols, Bluetooth protocols, USB protocols, and/or any other wireless protocol.
Via these communication standards and protocols, the user computing entity 20 can communicate with various other devices using concepts such as Unstructured Supplementary Service information/data (USSD), Short Message Service (SMS), Multimedia Messaging Service (MMS), Dual-Tone Multi-Frequency Signaling (DTMF), and/or Subscriber Identity Module Dialer (SIM dialer). The user computing entity 20 can also download changes, add-ons, and updates, for instance, to its firmware, software (e.g., including executable instructions, applications, program modules), and operating system.
According to some embodiments, the user computing entity 20 may include location determining aspects, devices, modules, functionalities, and/or similar words used herein interchangeably to acquire location information/data regularly, continuously, or in response to certain triggers. For example, the user computing entity 20 may include outdoor positioning aspects, such as a location module adapted to acquire, for example, latitude, longitude, altitude, geocode, course, direction, heading, speed, UTC, date, and/or various other information/data. In some embodiments, the location module can acquire information/data, sometimes known as ephemeris information/data, by identifying the number of satellites in view and the relative positions of those satellites. The satellites may be a variety of different satellites, including LEO satellite systems, DOD satellite systems, the European Union Galileo positioning systems, the Chinese Compass navigation systems, Indian Regional Navigational satellite systems, and/or the like. Alternatively, the location information/data may be determined by triangulating the apparatus's 30 position in connection with a variety of other systems, including cellular towers, Wi-Fi access points, and/or the like. Similarly, the user computing entity 20 may include indoor positioning aspects, such as a location module adapted to acquire, for example, latitude, longitude, altitude, geocode, course, direction, heading, speed, time, date, and/or various other information/data. Some of the indoor aspects may use various position or location technologies including RFID tags, indoor beacons or transmitters, Wi-Fi access points, cellular towers, nearby computing entities (e.g., smartphones, laptops) and/or the like. For instance, such technologies may include iBeacons, Gimbal proximity beacons, BLE transmitters, NFC transmitters, and/or the like. These indoor positioning aspects can be used in a variety of settings to determine the location of someone or something to within inches or centimeters.
The user computing entity 20 may also comprise a user interface device comprising one or more user input/output interfaces (e.g., a display 316 and/or speaker/speaker driver coupled to a processing element 308 and a touch interface, keyboard, mouse, and/or microphone coupled to a processing element 308). For example, the user interface may be configured to provide a mobile application, browser, interactive user interface, dashboard, webpage, and/or similar words used herein interchangeably executing on and/or accessible via the user computing entity 20 to cause the display or audible presentation of information/data and for user interaction therewith via one or more user input interfaces. Moreover, the user interface can comprise or be in communication with any of a number of devices allowing the user computing entity 20 to receive information/data, such as a keypad 318 (hard or soft), a touch display, voice/speech or motion interfaces, scanners, readers, or other input device. In embodiments including a keypad 318, the keypad 318 can include (or cause display of) the conventional numeric (0-9) and related keys (#, *), and other keys used for operating the user computing entity 20 and may include a full set of alphabetic keys or set of keys that may be activated to provide a full set of alphanumeric keys. In addition to providing input, the user input interface can be used, for example, to activate or deactivate certain functions, such as screen savers and/or sleep modes. Through such inputs the user computing entity 20 can capture, collect, store information/data, user interaction/input, and/or the like.
The user computing entity 20 can also include volatile storage or memory 322 and/or non-volatile storage or memory 324, which can be embedded and/or may be removable. For example, the non-volatile memory may be ROM, PROM, EPROM, EEPROM, flash memory, MMCs, SD memory cards, Memory Sticks, CBRAM, PRAM, FeRAM, RRAM, SONOS, racetrack memory, and/or the like. The volatile memory may be RAM, DRAM, SRAM, FPM DRAM, EDO DRAM, SDRAM, DDR SDRAM, DDR2 SDRAM, DDR3 SDRAM, RDRAM, RIMM, DIMM, SIMM, VRAM, cache memory, register memory, and/or the like. The volatile and non-volatile storage or memory can store databases, database instances, database management system entities, information/data, applications, programs, program modules, scripts, source code, object code, byte code, compiled code, interpreted code, machine code, executable instructions, and/or the like to implement the functions of the user computing entity 20.
As described below, the apparatuses, systems, and methods described herein provide techniques for improving operational reliability and computational efficiency of risk prediction predictive data analysis solutions by using a hierarchical risk prediction machine learning framework. As further described herein, a hierarchical risk prediction machine learning framework may selectively deploy a particular machine learning model/component while simultaneously performing training operations on another machine learning model/component. For example, a hierarchical risk prediction machine learning framework may generate predictive outputs using an initially-deployed risk prediction machine learning model and use the outputs of the initially-deployed risk prediction machine learning model to generate training data for a dynamically-deployed risk prediction machine learning model. In some embodiments, the outputs generated by the initially-deployed risk prediction machine learning model may be anonymized and deidentified to provide comprehensive training data that excludes personally identifiable information (PII). Additionally, using the noted hierarchical framework, deployment of the dynamically-deployed risk prediction machine learning model may be deferred until a target performance threshold is reached. Accordingly, by using a hierarchical risk prediction machine learning framework, various embodiments of the present invention optimize and improve the process of training dynamically-deployed risk prediction machine learning models while facilitating generation of useful predictive outputs during the training process. Thus, the solutions described herein improve operational reliability and computational efficiency of risk prediction data analysis solutions.
As further described below, various embodiments of the present invention disclose techniques for more efficiently and reliably performing predictive data analysis. For example, various embodiments of the present invention disclose techniques for performing predictive data analysis operations utilizing a hierarchical risk prediction machine learning framework. For example, according to some embodiments of the present invention, predictive data analysis using a hierarchical risk prediction machine learning framework can be performed by: (i) generating an initial risk score associated with an input feature data object using an initially-deployed risk prediction machine learning model of the hierarchical risk prediction machine learning framework, (ii) generating an adjusted risk score associated with an input feature data object using a dynamically-deployed risk prediction machine learning model of the hierarchical risk prediction machine learning framework, (iii) generating a predicted risk score using a risk aggregation machine learning model of the hierarchical risk prediction machine learning framework based at least in part on the initial risk score and the adjusted risk score, and (iv) performing one or more prediction-based actions based at least in part on the predicted risk score.
As further described below, various embodiments of the present invention describe techniques for increasing efficiency of machine learning frameworks while maintaining the outputs of the machine learning frameworks within a desired threshold accuracy/reliability range. For example, in some embodiments, a hierarchical machine learning framework includes an initially-deployed component and a dynamically-deployed component, where the initially-deployed component is trained using training data that is available before deployment of the hierarchical machine learning framework but is expected to be less accurate, while the dynamically-deployed component is trained using training data that is available after deployment of the hierarchical machine learning framework but is expected to be more accurate. This approach ensures that, before the training data for the dynamically-deployed component is available, the hierarchical machine learning framework only comprises the initially-deployed component and thus avoids the need for performing computational instructions associated with executing operations of the dynamically-deployed component of the hierarchical machine learning framework. In this way, by disclosing a hierarchical machine learning framework includes an initially-deployed component and a dynamically-deployed component, various embodiments of the present invention introduce techniques for increasing efficiency of machine learning frameworks while maintaining the outputs of the machine learning frameworks within a desired threshold accuracy/reliability range.
As further described below, various embodiments of the present invention improve data security of implementing machine learning frameworks using a client-server architecture, where the input features of a machine learning framework are provided by a client device to a predictive data analysis server system. For example, in some embodiments, at least part of the input data provided by the client device (e.g., image/video data associated with an identifiable feature data object) are removed after performing predictive inferences and thus not permanently maintained. In some embodiments, an input feature data object is associated with an identifiable feature data object that is removed from a storage subsystem associated with a predictive data analysis system after generating a predictive output (e.g., an initial risk and/or a predicted risk score) based at least in part on the input feature data object. In some embodiments, an input feature data object is associated with a deidentified three-dimensional model that is permanently stored and/or not removed from a storage subsystem associated with a predictive data analysis system after generating a predictive output (e.g., an initial risk and/or a predicted risk score) based at least in part on the input feature data object. In some embodiments, the deidentified three-dimensional model is used as input data for a dynamically-deployed component of a machine learning framework, while the identifiable feature data object is used as input data for an initially-deployed component of the machine learning framework. In this way, if the predictive data analysis system is compromised, only permanently-stored data (e.g., de-identified data) are comprised, while identifiable data are not compromised. In this way, by ensuring that at least part of the input data provided by the client device (e.g., image/video data associated with an identifiable feature data object) are removed after performing predictive inferences and thus not permanently maintained, various embodiments of the present invention improve data security of implementing machine learning frameworks using a client-server architecture, where the input features of a machine learning framework are provided by a client device to a predictive data analysis server system.
Although the following exemplary operations are described as being performed by one of the risk prediction computing entity 10, user computing entity 20, or wearable device 40, it should be understood that in various embodiments, the operations can be interchangeably performed by other components within the system architecture 100.
In various embodiments, an example risk prediction computing entity 10 may be configured to generate a predicted risk score. The term predicted risk score may refer to a data object that describes an inferred measure of risk with respect to an input feature data object. For example, the predicted risk score may be related to whether a predictive entity (e.g., individual) that is associated with the input feature data object is likely to have a rare disease and/or should be referred for a rare disease screening/investigation (e.g., DNA sequencing/testing, clinician review, and/or the like). The example predicted risk score may be used to perform one or more prediction-based actions with respect to the input feature data object.
Referring now to
Beginning at step/operation 401, risk prediction computing entity 10 receives a risk scoring request for a predictive entity. In some embodiments, a predictive entity may describe an individual (e.g., child, patient, member, or the like). In some embodiments, a risk scoring request may be initiated by a parent that is concerned about a lack of a diagnosis or suspects that their child may have a rare disease. The risk scoring request may be generated by a computing entity (e.g., such as but not limited to, user computing entity 20) discussed above in connection with
Returning to
Subsequent to step/operation 402, in an instance in which risk prediction computing entity 10 determines that the predictive entity is not associated with an input feature data object, the process 400 proceeds to step/operation 403. At step/operation 403, risk prediction computing entity 10 generates the input feature data object based at least in part on user-entered data. In some embodiments, generating the input feature data object may be performed as part of registering a user. In some embodiments, as part of registering a user, risk prediction computing entity 10 may obtain (e.g., request and receive) various data objects describing information/data associated with a user.
Referring now to
Returning to
In various examples, risk prediction computing entity 10 may generate user interface data in order to facilitate capture of image/video sensor data, physiological data (e.g., via a wearable device 40), combinations thereof, and/or the like associated with the predictive entity (e.g., individual or child) by a user (e.g., parent or guardian). In some embodiments, the user interface data may be based at least in part on a clinical protocol developed with the input of pediatricians, rare disease experts/clinicians, neurologists and machine learning experts specializing in computer vision. The example clinical protocol may be associated with features, traits, and clinical signs that a rare disease expert would evaluate in an in-person consultation with a patient. The clinical protocol may comprise holistic characteristics, head and face characteristics, arm length characteristics, posture and muscle tone characteristics, and hand, finger and toe-related characteristics. Table 1 below provides an exemplary list of features, traits and clinical signs that may be used to develop a protocol/generate user interface data for capturing image/video sensor data.
In some embodiments, a user may be prompted/directed to capture images of particular areas of the body (e.g., the face, the head, the torso, and/or the like) in various positions (e.g., supine, standing, and the like) via an image sensor (e.g., camera) of a user computing entity (e.g., mobile device). Additionally, a user may be prompted/directed to obtain image data via an image sensor/camera of the user computing entity for performing gait analysis by the risk prediction computing entity 10. In some embodiments, at least a portion of the sensor data (image/video sensor data and/or other sensor data) obtained via the user computing entity 20 and/or wearable device 40 may be transferred to the risk prediction computing entity 10 for performing at least a portion of the required operations. The wearable device 40 or user computing entity 20 may be configured to provide information/data in response to requests/queries received from the risk prediction computing entity 10. In various embodiments, the data may be transferred to the risk prediction computing entity 10 which may provide a pseudo-ID to associate particular image/video sensor data therewith.
Referring now to
Returning to
Referring now to
Returning to
Subsequent to step/operation 406, the process 400 proceeds to step/operation 407. At step/operation 407, risk prediction computing entity 10 performs one or more prediction-based actions. In some embodiments, prediction-based tasks may include various intervention operations including generating a report and/or alerts for a user, automatically initiating a rare disease investigation (e.g., providing recommendations, scheduling an in-person visit, genomic testing, providing advocacy/support information/contacts, initiating enrollment in clinical trials, and/or the like). In some embodiments, exemplary recommendations may include: (i) recommending a review of the individual's health with a general practitioner, (ii) recommending engagement of a genetic counsellor for whole genome sequencing, and (iii) recommending a nearby rare disease specialist and/or Centre of Excellence for a face-to-face consultation. In some embodiments, if a consultation with a specialist is recommended, derived HPO terms and the associated image/video sensor data may be forwarded to a physician if appropriate and possible in advance of the consultation. In some embodiments, risk prediction computing entity 10 may retain at least a portion of the data associated with the individual in order to subsequently confirm whether the recommended outcome is successful and, in some examples, update corresponding weights/parameters of at least one component of a hierarchical risk prediction machine learning model framework accordingly. In some embodiments, risk prediction computing entity 10 may facilitate transfer of at least a portion of the data obtained with respect to an individual to a physician, consultant, or specialist in advance of a consultation.
Referring now to
As depicted in
Referring now to
As further depicted, the dynamically-deployed risk prediction machine learning model 504 is configured to process the input deidentified three-dimensional model 505 in order to generate an adjusted risk score 513. As illustrated, risk prediction computing entity 10 uses the initial risk score 507 and the adjusted risk score 513 as inputs to a risk aggregation machine learning model 520 for generating the predicted risk score 530. The risk aggregation machine learning model may be a supervised machine learning model or an unsupervised machine learning model (e.g., a clustering model). As illustrated in
Referring now to
Beginning at step/operation 602, the risk prediction computing entity 10 obtains (e.g., generates, receives, or the like) an identifiable feature data object. As noted above, the identifiable feature data object may describe identifiable features associated with an individual (e.g., a three-dimensional movement profile, one or more three-dimensional body-related characteristics, patient information/data, contextual features associated with an individual/related entities, and/or the like).
Subsequent to obtaining the identifiable feature data object at step/operation 602, the process 600 proceeds at step/operation 604. At step/operation 604, the risk prediction computing entity 10 generates an input deidentified three-dimensional model (e.g., describing a deidentified/anonymized three-dimensional representation of an individual's movement profile, gait, and/or body-related characteristics). The input deidentified three-dimensional model may describe the gross features associated with an individual—such as the dimensions of the head—but lack any identifiable information.
Subsequent to generating an input deidentified three-dimensional model at step/operation 604, the process 600 proceeds to step/operation 606. At step/operation 606, risk prediction computing entity 10 determines an initial risk score based at least in part on the input deidentified three-dimensional model and using an initially deployed risk prediction machine learning model.
Subsequent to determining the initial risk score at step/operation 606, the process 600 proceeds to step/operation 608. At step/operation 608, risk prediction computing entity 10 determines a recommendation validation indicator based at least in part on the initial risk score. The recommendation validation indicator may be a data object that describes a determination relating to a degree of correspondence between a risk score (e.g., initial risk score or predicted risk score) associated with a predicted recommendation and a validated outcome of a subsequent rare disease screening/investigation. For example, if a predicted risk score/initial risk score is an above-threshold value (e.g., indicating that an individual is likely to have a rare disease and/or should be referred for a rare disease screening/investigation) and the outcome of a subsequent rare disease screening/investigation is positive (i.e., the individual is diagnosed by a clinician as having a rare disease), then the recommendation validation indicator may be positive. Conversely, if the predicted risk score/initial risk score is a below-threshold value (e.g., indicating that the individual is not likely to have a rare disease and should not be referred for a rare disease screening/investigation) and the outcome of a subsequent rare disease screening/investigation is positive (i.e., the individual is diagnosed by a clinician as having a rare disease), then the recommendation validation indicator may be negative.
Subsequent to determining the recommendation validation indicator at step/operation 608, the process 600 proceeds to step/operation 610. At step/operation 610, risk prediction computing entity 10 generates a dynamic deployment training entry. In some embodiments, the dynamic deployment training entry may be a training entry deidentified three-dimensional model that is in turn associated with a corresponding training entry feature data object and a corresponding dynamic deployment ground-truth indicator. In some embodiments, the dynamic deployment ground-truth indicator may be a data object that describes a validated outcome of a rare disease screening or investigation. For example, a dynamic deployment ground-truth indicator may be associated with a training entry feature data object describing features of a deidentified individual that is identified as having a rare disease (e.g., as a result of a rare disease screening/investigation). In some embodiments, a training entry deidentified three-dimensional model may be a data object that describes a deidentified three-dimensional model/representation (e.g., comprising a deidentified three-dimensional movement profile and/or one or more three-dimensional body-related characteristics).
Subsequent to generating the dynamic deployment entry at step/operation 610, the process 600 proceeds to step/operation 612. At step/operation 612, risk prediction computing entity 10 trains a dynamically-deployed risk prediction machine learning model using the dynamic deployment training entry. In various embodiments, the risk prediction computing entity 10 may continue to generate initial risk scores using the initially-deployed risk prediction machine learning model and use the input deidentified three-dimensional model and associated recommendation validation indicators to generate training data (dynamic deployment training entries) for the dynamically-deployed risk prediction machine learning model.
As depicted in
As further illustrated in
At step/operation 614, in an instance in which risk prediction computing entity 10 determines that the dynamic deployment training entry count satisfies (e.g., exceeds) the dynamic deployment training entry count threshold, the process 600 proceeds to step/operation 616 and risk prediction computing entity 10 triggers deployments of the dynamically-deployed risk prediction machine learning model.
Accordingly, as described above, various embodiments of the present invention describe techniques for increasing efficiency of machine learning frameworks while maintaining the outputs of the machine learning frameworks within a desired threshold accuracy/reliability range. For example, in some embodiments, a hierarchical machine learning framework includes an initially-deployed component and a dynamically-deployed component, where the initially-deployed component is trained using training data that is available before deployment of the hierarchical machine learning framework but is expected to be less accurate, while the dynamically-deployed component is trained using training data that is available after deployment of the hierarchical machine learning framework but is expected to be more accurate. This approach ensures that, before the training data for the dynamically-deployed component is available, the hierarchical machine learning framework only comprises the initially-deployed component and thus avoids the need for performing computational instructions associated with executing operations of the dynamically-deployed component of the hierarchical machine learning framework. In this way, by disclosing a hierarchical machine learning framework includes an initially-deployed component and a dynamically-deployed component, various embodiments of the present invention introduce techniques for increasing efficiency of machine learning frameworks while maintaining the outputs of the machine learning frameworks within a desired threshold accuracy/reliability range.
As further described above, various embodiments of the present invention improve data security of implementing machine learning frameworks using a client-server architecture, where the input features of a machine learning framework are provided by a client device to a predictive data analysis server system. For example, in some embodiments, at least part of the input data provided by the client device (e.g., image/video data associated with an identifiable feature data object) are removed after performing predictive inferences and thus not permanently maintained. In some embodiments, an input feature data object is associated with an identifiable feature data object that is removed from a storage subsystem associated with a predictive data analysis system after generating a predictive output (e.g., an initial risk and/or a predicted risk score) based at least in part on the input feature data object. In some embodiments, an input feature data object is associated with a deidentified three-dimensional model that is permanently stored and/or not removed from a storage subsystem associated with a predictive data analysis system after generating a predictive output (e.g., an initial risk and/or a predicted risk score) based at least in part on the input feature data object. In some embodiments, the deidentified three-dimensional model is used as input data for a dynamically-deployed component of a machine learning framework, while the identifiable feature data object is used as input data for an initially-deployed component of the machine learning framework. In this way, if the predictive data analysis system is compromised, only permanently-stored data (e.g., de-identified data) are comprised, while identifiable data are not compromised. In this way, by ensuring that at least part of the input data provided by the client device (e.g., image/video data associated with an identifiable feature data object) are removed after performing predictive inferences and thus not permanently maintained, various embodiments of the present invention improve data security of implementing machine learning frameworks using a client-server architecture, where the input features of a machine learning framework are provided by a client device to a predictive data analysis server system.
Many modifications and other embodiments of the inventions set forth herein will come to mind to one skilled in the art to which these inventions pertain having the benefit of the teachings presented in the foregoing descriptions and the associated drawings. Therefore, it is to be understood that the inventions are not to be limited to the specific embodiments disclosed and that modifications and other embodiments are intended to be included within the scope of the appended claims. Although specific terms are employed herein, they are used in a generic and descriptive sense only, and not for purposes of limitation.