Work place: Nepal College of Information Technology
E-mail: apurwa@gmail.com
Website: https://orcid.org/0000-0001-5970-8482
Research Interests: Artificial Intelligence, Autonomic Computing, Data Structures and Algorithms,
Biography
Apurwa Singh: He graduated master’s degree in Computer Science from Nepal College of Information Technology, Lalitpur, Kathmandu Nepal, in 2021 His research areas include data analytics, artificial intelligence, cloud computing, and networking.
DOI: https://doi.org/10.5815/ijisa.2023.02.05, Pub. Date: 8 Apr. 2023
Healthcare is a fundamental human right. Vulnerable populations in healthcare refer to those who are at greater risk of suffering from health hazards due to various socio-economic factors, geographical barriers, and medical conditions. Mapping of this vulnerable population is a vital part of healthcare planning for any region. Very few such research regarding the distribution of healthcare service providers was carried out in the Nepali context previously. Thus, the results of vulnerability mapping can help with meaningful interventions for healthcare demands. This study focused on combining geo-analytics, unsupervised machine learning algorithms, and entropy methods for performing vulnerability mapping. K-means++ clustering algorithm was applied to household data of Ratnanagar municipality for the purpose of creating multiple clusters of households. An open-source routing machine was used to compute the distance to the nearest health service provider from each household in Ratnanagar municipality. The entropy method was used to evaluate the vulnerability measure of each cluster. Later, based on the population of different clusters in each ward and their respective vulnerability measures, each ward’s vulnerability measure was quantified. It can be observed that wards that are farther away from the east-west highway have higher vulnerability indices. This study found that machine learning algorithms can be effectively used in combination with the weighting method for vulnerability mapping. Using an unsupervised machine learning algorithm made sure that dimensions of vulnerability are visible.
[...] Read more.Subscribe to receive issue release notifications and newsletters from MECS Press journals