Survival Analysis Techniques - Time-to-Event Modeling: Investigating survival analysis techniques for modeling time-to-event data, commonly used in healthcare and reliability engineering
Keywords:
Survival analysis, Cox proportional hazards modelAbstract
Survival analysis is a statistical method for analyzing time-to-event data, where the primary interest is the time until an event of interest occurs. This paper provides an overview of survival analysis techniques, focusing on their application in healthcare and reliability engineering. We discuss the key concepts of censoring, survival functions, hazard functions, and the Kaplan-Meier estimator. We also explore parametric and non-parametric survival models, including the Cox proportional hazards model. Additionally, we review advanced topics such as competing risks and time-dependent covariates. This paper aims to provide a comprehensive understanding of survival analysis techniques and their practical application in modeling time-to-event data.
Downloads
References
Pulimamidi, Rahul. "Emerging Technological Trends for Enhancing Healthcare Access in Remote Areas." Journal of Science & Technology 2.4 (2021): 53-62.
K. Joel Prabhod, “ASSESSING THE ROLE OF MACHINE LEARNING AND COMPUTER VISION IN IMAGE PROCESSING,” International Journal of Innovative Research in Technology, vol. 8, no. 3, pp. 195–199, Aug. 2021, [Online]. Available: https://ijirt.org/Article?manuscript=152346
Pelluru, Karthik. "Enhancing Network Security: Machine Learning Approaches for Intrusion Detection." MZ Computing Journal 4.2 (2023).
Tatineni, Sumanth. "Applying DevOps Practices for Quality and Reliability Improvement in Cloud-Based Systems." Technix international journal for engineering research (TIJER)10.11 (2023): 374-380.
Sistla, Sai Mani Krishna, and Bhargav Kumar Konidena. "IoT-Edge Healthcare Solutions Empowered by Machine Learning." Journal of Knowledge Learning and Science Technology ISSN: 2959-6386 (online) 2.2 (2023): 126-135.
Krishnamoorthy, Gowrisankar, and Sai Mani Krishna Sistla. "Exploring Machine Learning Intrusion Detection: Addressing Security and Privacy Challenges in IoT-A Comprehensive Review." Journal of Knowledge Learning and Science Technology ISSN: 2959-6386 (online) 2.2 (2023): 114-125.
Gudala, Leeladhar, et al. "Leveraging Biometric Authentication and Blockchain Technology for Enhanced Security in Identity and Access Management Systems." Journal of Artificial Intelligence Research 2.2 (2022): 21-50.
Prabhod, Kummaragunta Joel. "Advanced Machine Learning Techniques for Predictive Maintenance in Industrial IoT: Integrating Generative AI and Deep Learning for Real-Time Monitoring." Journal of AI-Assisted Scientific Discovery 1.1 (2021): 1-29.
Tembhekar, Prachi, Munivel Devan, and Jawaharbabu Jeyaraman. "Role of GenAI in Automated Code Generation within DevOps Practices: Explore how Generative AI." Journal of Knowledge Learning and Science Technology ISSN: 2959-6386 (online) 2.2 (2023): 500-512.
Devan, Munivel, Kumaran Thirunavukkarasu, and Lavanya Shanmugam. "Algorithmic Trading Strategies: Real-Time Data Analytics with Machine Learning." Journal of Knowledge Learning and Science Technology ISSN: 2959-6386 (online) 2.3 (2023): 522-546.
Tatineni, Sumanth, and Venkat Raviteja Boppana. "AI-Powered DevOps and MLOps Frameworks: Enhancing Collaboration, Automation, and Scalability in Machine Learning Pipelines." Journal of Artificial Intelligence Research and Applications 1.2 (2021): 58-88.
Sadhu, Ashok Kumar Reddy. "Enhancing Healthcare Data Security and User Convenience: An Exploration of Integrated Single Sign-On (SSO) and OAuth for Secure Patient Data Access within AWS GovCloud Environments." Hong Kong Journal of AI and Medicine 3.1 (2023): 100-116.
Makka, A. K. A. “Administering SAP S/4 HANA in Advanced Cloud Services: Ensuring High Performance and Data Security”. Cybersecurity and Network Defense Research, vol. 2, no. 1, May 2022, pp. 23-56, https://thesciencebrigade.com/cndr/article/view/285.