Abstract
The growing number of patients and the emergence of new symptoms and diseases make health monitoring and assessment increasingly complex for medical staff and hospitals. The execution of big and heterogeneous data gathered by medical sensors and the necessity of patient classification and disease analysis have become serious problems for various health-based sensing applications. The significant features of healthcare are the privacy of medical details and the accuracy of disease identification. One of the key benefits of the healthcare system is the ability to predict diseases early. Recently, the progress of artificial intelligence (AI) in the healthcare system has been a high priority. Machine learning (ML) and deep learning (DL) effectively make analyses and strategic decisions for the healthcare system. This manuscript proposes a Modified Coati Optimization Driven Blockchain for Healthcare Disease Detection and Classification (MCODBC-HDDC) method. The presented MCOBC-HDDC method provides an efficient and accurate disease diagnosis, utilizing a system that depends on DL techniques. Initially, the MCODBC-HDDC method incorporates BC technology to ensure secure data sharing and management, providing a decentralized and tamper-proof environment for patient data. In the data preprocessing stage, the MCODBC-HDDC model employs Z-score normalization to standardize the data and improve performance. For the optimal subset of features, the spotted hyena optimization algorithm (SHOA) model is used. Furthermore, the attention bidirectional gated recurrent unit (ABiGRU) method is implemented for disease detection and classification. Finally, the hyperparameter selection of the ABiGRU method is performed by utilizing the modified coati optimization algorithm (MCOA) method. The experimental analysis of the MCODBC-HDDC approach is examined under the HD dataset. The performance validation of the MCODBC-HDDC approach portrayed a superior accuracy value of 97.36% over existing models.
Similar content being viewed by others
Introduction
The healthcare industry creates various data about patients, diagnoses, and diseases, but it is not properly examined, so it does not present the value that needs to be. Heart disease is the main cause of death1. According to the WHO, cardiovascular disease (CVD) is the important reason of death globally, causing the fatalities of approximately 17.9 million persons yearly. The healthcare sector creates various data about patients, diagnoses, and diseases, but it is not appropriately analyzed, so it does not have a similar effect as it should on patient well-being2. Additionally, socioeconomic factors like money and jobs have a great impact on the mortality rate by the effect on contraindications associated with lifestyle after and before cardiac illness. The greatest way to reduce such deaths is to identify them instantly3. The capability to predict the occurrence of heart illness can be crucial for managing the required treatment without delay. The decentralized process of providing security and incorporation is resolved over Blockchain (BC). The BC offers probable advantages by encrypting the data kept, and also every block can be e-signed to deliver a higher level of accuracy4. BC is an appropriate solution for the healthcare sector as it contains various performers and needs a great level of trust among the performers. The Healthcare industry is an important domain in the present information and communication technology domain. Nowadays, remote patient monitoring and digital health records are probable by the IoT in the healthcare sector5. The healthcare data created by different resources were widespread and are in various methods that increase anguishes regarding the data quality. Also, it has the potential to utilize health data in various applications, like prediction of disease6. Therefore, data quality must be assured while incorporating the data from numerous devices, and it is quite challenging. The problem of data privacy occurs once the healthcare data are distributed across the network, and single-point failure is probable when the data are kept in a leading centralized position. BC is a distributed storage, whose goal is to synchronize data across healthcare sources7.
Alternatively, Deep learning (DL) is a subcategory of artificial intelligence (AI), which utilizes intricate neural networks (NNs) for extracting insights and patterns from massive quantities of data8. The main benefit of utilizing DL techniques in combination with BC is the capability to analyze and process various kinds of data, with wearable sensor data, medical imaging, genomic information, and electronic health records9. DL methods could learn from these heterogeneous and rich data to recognize risk factors, biomarkers, and patterns related to different neurological illnesses like Parkinson’s disease, Alzheimer’s illness, epilepsy, and multiple sclerosis10. This interoperability enables the making of widespread datasets, which improve the precision and strength of DL methods, inducing enhanced diagnostic abilities.
The growing volume of medical data presents a valuable opportunity to improve disease detection and classification through intelligent analysis. Several data are improperly utilized due to restrictions in conventional processing methods and concerns over data security. Advanced technologies such as DL can extract crucial patterns for precise diagnosis, while BC ensures secure and transparent data management. Integrating these technologies presents a robust framework for enhancing clinical decision-making and patient care. This study is motivated by the requirement for a robust, secure, and efficient model to address the challenges of modern disease detection and classification in healthcare systems.
This manuscript proposes a Modified Coati Optimization Driven Blockchain for Healthcare Disease Detection and Classification (MCODBC-HDDC) method. The presented MCOBC-HDDC method provides an efficient and accurate disease diagnosis, utilizing a system that depends on DL techniques. Initially, the MCODBC-HDDC method incorporates BC technology to ensure secure data sharing and management, providing a decentralized and tamper-proof environment for patient data. In the data preprocessing stage, the MCODBC-HDDC model employs Z-score normalization to standardize the data and improve performance. For the optimal subset of features, the spotted hyena optimization algorithm (SHOA) model is used. Furthermore, the attention bidirectional gated recurrent unit (ABiGRU) method is implemented for disease detection and classification. Finally, the hyperparameter selection of the ABiGRU method is performed by utilizing the modified coati optimization algorithm (MCOA) method. The experimental analysis of the MCODBC-HDDC approach is examined under the HD dataset. The key contribution of the MCODBC-HDDC approach is listed below.
-
The MCODBC-HDDC model integrates BC to ensure secure, decentralized, and tamper-proof sharing and management of patient data. It improves data integrity and trust across healthcare systems, facilitating reliable stakeholder communication while safeguarding sensitive medical information.
-
The MCODBC-HDDC approach implements the Z-score normalization to improve data preprocessing by standardizing features to a standard scale. This improves model convergence and mitigates the influence of outliers. The model also confirms more reliable input for subsequent feature selection and classification stages.
-
The MCODBC-HDDC method utilizes the SHOA technique for optimal feature selection by detecting the most relevant attributes in the dataset. This mitigates computational complexity and improves the model’s efficiency. Removing redundant or less informative features strengthens the overall predictive performance.
-
The MCODBC-HDDC methodology implements the ABiGRU model to improve the accuracy of disease detection and classification. It captures contextual dependencies in both forward and backward sequences, improving the model’s capability to comprehend complex temporal patterns in patient data.
-
The MCODBC-HDDC method employs the MCOA model to enable precise fine-tuning of model hyperparameters, resulting in improved predictive performance. It balances exploration and exploitation during optimization, resulting in a more robust and well-generalized disease prediction model.
-
The novelty of the MCODBC-HDDC model is its integration of BC-based security, SHOA-driven feature selection, and MCOA-tuned ABiGRU classification. This integration creates a highly secure, efficient, and explainable framework for healthcare prediction. The model ensures robust performance and reliable data management by incorporating blockchain, optimization techniques, and advanced DL. This integration represents a significant advancement in secure and accurate healthcare forecasting.
Related works
This section reviews recent advancements integrating BC and DL in healthcare data management and security. Several studies have proposed innovative models that enhance privacy, classification accuracy, and secure data sharing. For example, Ragab et al.11 propose a BC-driven privacy-preserving analysis of EHR utilizing a sine cosine algorithm (SCA) with a DL method called the BPEHR-SCADL model. The BPEHR-SCADL method mainly models an artificial fish swarm algorithm (AFSA) with a sign-cryption model to safely transfer EHRs. Furthermore, the BPEHR-SCADL model utilizes BC technology to store patients’ medical and official data in an exterior database. Also, the SCA with a deep feedforward neural network (DFFNN) technique can be used for the process of classification. Moreover, the SCA is used to optimally alter the bias and weight values of the DFFNN method. Ali et al.12 introduce a permission-based BC structure for extensible and secure healthcare systems, incorporating hybrid DL methods. The structure guarantees that only approved individuals can modify and access sensitive health data, maintaining patient confidentiality while enabling continuous data sharing and association among healthcare sources. Alanazi et al.13 suggest a new BC with an optimum DL-based safe data sharing and classification (BCODL-SDSC) model in the upcoming healthcare system. Initially, the BCODL-SDSC model allows BC technology to store and preserve patient information from the process of numerous communications and facilitate access control to the numerous participants.
Alamro et al.14 introduce BC Aided IoT Healthcare System utilizing Ant Lion Optimizer with Hybrid DL (BHS-ALOHDL) method. The BHS-ALOHDL approach implements the ALO ALO-based feature subset selection (ALO-FSS) model to create sequences of feature vectors. Mohananthini et al.15 propose a novel BC-aided heart illness recognition and classification method with feature selection (FS) with optimum fuzzy logic (BHDDC-FSOFL) system. The suggested BHDDC-FSOFL model utilizes BC technology to store healthcare information safely. Furthermore, the illness recognition module contains the model of the learning-based optimizer (BTLBO) method and biogeography teaching for the FS process. In addition, the ebola search optimizer (ESO) method can be utilized for the ANFIS classifier parameter tuning.
Qu et al.16 present a quantum arrhythmia detection system named QADS. Additionally, a quantum NN was utilized in QADS to identify unusual ECG data that is given to advance CVD diagnosis. Every quantum block saves the present and preceding block hash to create a quantum block network. The novel quantum BC method presents a managed quantum walk hash function and a quantum verification protocol for assuring security and validity in making novel blocks. Also, this study creates a hybrid quantum CNN named HQCNN for extracting the temporal features of ECG to identify unusual heart rates. Naveen et al.17 present an innovative solution by incorporating the DenseNet structure with BC technology to improve the recognition of melanoma. Using a quantitative method, the research uses the DenseNet method that features dense connectivity transition layers, and bottleneck layers to enhance feature representation while reducing computational difficulty and size of the model. The method is additionally improved by transfer learning (TL), pre-trained on a dermoscopic image dataset.
Kateb et al.18 presented the enhanced security mechanism for human-centred systems using deep learning with a jellyfish search optimizer (ESHCS-DLJSO) approach for secure IoT healthcare. The model employs min–max normalization, bacterial foraging optimization algorithm (BFOA) for feature extraction, a convolutional neural network with long short-term memory and attention (CNN-LSTM-Attention) for disease detection, and jellyfish search optimizer (JSO) for hyperparameter tuning. Rahal et al.19 proposed a BC-based approach for securely sharing locally trained DL methods across healthcare sectors. Hota et al.20 proposed a customized CNN-based intelligent diagnosis system. The model comprises hospital registration via smart contracts, disease diagnosis, and secure learning parameters, ensuring data privacy and attack resilience. Rokade and Mishra21 proposed a BC-based system for classifying skin diseases using an optimized DL method, integrating a novel transit circle-inspired optimization (TCIO) model for LeNet and a modified DeepJoint segmentation technique. Islam et al.22 explored the utilization of ML and AI in early disease detection, healthcare optimization, and predictive analytics.
Shammi et al.23 reviewed the role of AI, ML, and BC in disease diagnosis and monitoring. It highlights the potential of these technologies to improve patient outcomes, enhance data security, and empower patients to control their health information. Matlo et al.24 introduced the proof of work validation with an explainable artificial intelligence (PoWV-XAI) approach, a BC-based validation scheme enhanced with XAI for healthcare applications. Khan and Jilani25 presented a privacy-preserving heart disease prediction system that integrates cryptographic techniques, BC, and DL on a cloud platform. The system ensures secure data handling and achieves high prediction accuracy for heart disease. Data is decrypted and input into the heart disease prediction system (HDPS), which uses an artificial neural network (ANN), CNN, and RNN for preprocessing, feature extraction, and selection. Kulkarni et al.26 presented a BC-based IoT model utilizing the Aquila hunter-prey optimization (AHPO) method to generate a privacy matrix integrated with medical data. The model also implements data augmentation through oversampling and employs a Deep Maxout Network with SpinalNet (Spinal PMDMNN) model for healthcare classification.
Gupta et al.27 proposed a framework integrating BC technology and federated learning (FL) to enable secure, collaborative lung disease classification while preserving data privacy. The model attains high accuracy using the DenseNet-201 model and IPFS for storage. Ahmed et al.28 improved smart healthcare services using the PSO-BioBERT model for named entity recognition and relation extraction tasks from clinical records. Dubey, Kapoor, and Saraswat29 enhanced early disease diagnosis and risk reduction using hybrid learning methods, biological feature selection, BC data storage, EEG analysis, bidirectional LSTM for time-series data, and advanced medical image processing, including Alzheimer’s diagnosis and image segmentation. Chougule et al.30 incorporated BC-based approaches with feature selection techniques utilizing entropy and correlation coefficients to improve healthcare prediction models’ accuracy, efficacy, and security using cloud-stored E-Health data from the IoT. Al-Marridi, Mohamed, and Erbad31 optimized healthcare decision-making, enhanced security, reduced latency, and minimized costs using BC technology, deep reinforcement learning (DRL), multi-agent Q-Learning, and mixed decentralized Markov decision process for improved Quality of Service (QoS) and resource utilization. Pradhan et al.32 explored the utilization of ML models in healthcare systems, specifically in healthcare IoT (HIoT) and EHR data, which are the key data resources for NN models while addressing challenges such as security and service quality improvement. Table 1 summarizes the existing studies on NN models in healthcare disease detection and classification.
The limitations of the existing approaches are data privacy, scalability, and the integration of multiple technologies such as BC and DL. Several models face issues with processing efficiency, particularly in large-scale healthcare systems and the management of computational resources, while BC ensures secure data storage and sharing. Furthermore, most DL models utilized in healthcare are highly dependent on large, high-quality datasets, which may not always be available due to privacy concerns and data fragmentation across various healthcare sectors. Additionally, a research gap exists in optimizing the collaboration between BC and DL for real-time healthcare applications, specifically in improving the scalability of BC-based data-sharing systems. The complexity of integrating BC with advanced DL techniques often results in performance bottlenecks and difficulties in maintaining real-time diagnosis. Another research gap is the limited exploration of hybrid models incorporating BC, DL, and other AI techniques, such as RL or FL, which could provide more efficient and secure solutions. Moreover, many studies have not adequately addressed interoperability issues between diverse healthcare systems, affecting seamless data exchange and collaboration. Lastly, there is also a requirement for better models to handle heterogeneous data sources in IoT-enabled healthcare systems while ensuring privacy and security.
Materials and methods
This manuscript proposes the MCODBC-HDDC method. The presented MCOBC-HDDC method provides an efficient and accurate diagnosis of disease utilizing a system based on DL techniques. To accomplish that, the MCODBC-HDDC model has different kinds of processes, as represented in Fig. 1.
Workflow of MCODBC-HDDC method.
Blockchain (BC) in healthcare
BC provides very substantial use in healthcare information with the research of medical33. A healthcare organization can do this with the aid of BC, along with the clinical exploration and claim procedure. The chain that utilizes BC was employed to upsurge safety for the spread of patient data through numerous companies. Although BC benefits healthcare organizations, a few latent vulnerabilities contain scalability, privacy, and cost. BC tackles challenges like interoperability and safely allows information sharing among experts and patients. The BC intends to manage healthcare applications and must tackle security, data privacy, and scalability. BC utilizes cryptographic notations for its effectual functioning. The healthcare data gateway structure was intended to use BC, which aids patients in splitting their healthcare data without negotiating confidentiality and endorsing intelligence\(.\) The BC was employed to hand over the health data safely through the distributed system. The architecture employs BC, where accord protocol was deployed to deliver the proof of authority. BC‐enabled intelligent IoT structure was proposed to utilize AI methods over the data firmly spread in the BC system. At the same time, there are manifold platforms and structures accessible for medical data organizations utilizing BC. However, a meta-heuristic technique is presented to learn from the obtainable data in the BC system. The idea behind the BC combination is to contain a proven learning resource. In a dynamic atmosphere, there is a greater chance of data management assaults, and the BC network might prohibit those.
Data pre-processing
In the data preprocessing stage, the MCODBC-HDDC model employs Z-score normalization to standardize the data and improve performance34. This model is chosen for its efficiency in standardizing features by centring them around a mean of zero and a standard deviation of one. The model is appropriate when the dataset comprises features with diverse units or scales, ensuring that no single feature disproportionately affects the model. Unlike min–max scaling, which can be sensitive to outliers, Z-score normalization is more robust in handling extreme values. The model also improves convergence and stability, particularly for optimization-based DL techniques such as ABiGRU. Creating a uniform scale across features enhances the model’s learning efficiency and predictive performance. This makes it an appropriate and reliable choice over other normalization techniques in healthcare data applications.
\({\varvec{Z}}\)‐score normalization is an essential method for feature scaling. Post-standardization, every feature part a standard scale, boasting mean \(({\varvec{\mu}})\) of 0 and SD \(({\varvec{\sigma}})\) of 1. This procedure significantly improves the precision of predictive methods.
whereas, \(x\) defines the new feature value, \({x}_{new}\) implies the standardized value, \(\mu\) relates to the mean of a new feature, and \(\sigma\) demonstrates the SD of the new feature.
SHOA-based FS
For the optimal subset of features, the SHOA is utilized35. This model is chosen for its robustness in exploration and exploitation, which are crucial for detecting the most relevant features in high-dimensional healthcare data. The model is chosen for its intellectual hunting behaviour of hyenas. Conventional techniques such as genetic algorithms (GAs) or particle swarm optimization (PSO) exhibit limitations in navigating the search space, whereas this model shows excellency in navigation to avoid local optima. The model also dynamically balances global and local search strategies, resulting in more accurate and compact feature subsets. This mitigates computational load while maintaining or improving model accuracy. The adaptability and convergence speed of the model makes it appropriate for complex, nonlinear healthcare datasets where irrelevant or redundant features can degrade performance. Figure 2 illustrates the flow of the SHOA technique.
Workflow of SHOA technique.
The SHOA aids as an ensuring optimizer device for tackling RDS optimizer tasks, delivering scalability, comfort of parameter tuning, and strong convergence while efficiently handling convergence problems and computation complexity. An adaptive stop condition is presented to stop iterations when no major development beyond a pre-defined threshold is kept in the last Kth iteration, certifying that the technique ends correctly upon convergence or evades premature uncertainty when the function of the objective endures to progress. The SHOA is a nature-oriented optimizer method that appeals to stimuli from the features and behaviour of spotted hyenas. They are famous for their flexibility, endurance, and supportive searching behaviour, which are employed to resolve optimizer issues. The technique utilizes global and local search tactics and adjustable operators and parameters for increasing performance. The flexible and effective behaviour of hyenas stimulates its new method. The SHOA is an optimization technique that uses formulations to repeatedly hunt for the nearest global optimal solution to an assumed issue. The key steps of SHOA are mentioned below:
Encircling prey: The technique involves deliberating numerous hunt aspects and constantly upgrading the near global optimal location concerning the target. The mathematical method employed to signify this action is stated over an exact formulation, which can vary depending on the optimizer issue.
\(R_{hp}\) signifies the distance between a spotted hyena and its victim; \(v_{p}\) denotes the location vector of prey, \(v_{h}\) denotes the location vector of the spotted hyena. \(j\) signifies the present iteration, \(Y,\) and \(Z\) represents the coefficient factor vectors \(.\)
Here, \(Iter=\text{0,1},2,\dots ,{Max}_{Iter}.\)
In the given context, \({v}_{r1}\) and \({v}_{r2}\) are randomly produced vectors in the interval of \((\text{0,1})\). Besides, the 1 value is linearly decreased from 5 to \(0\) in an assumed range.
Hunting: The hunting tactic is portrayed as below:
whereas, \({v}_{p,besi}\) represents the most favourable posture of spotted hyenas relative to the prey. \({v}_{h,best}\) signifies another position for the spotted hyena. The below-mentioned equation is employed to calculate the complete number of spotted hyenas, denoted as \({N}_{h}.\)
While, the randomly produced vector \(G\) lies in the range of (0.5, 1). \(n\) signifies the total amount of responses. \(C_{n}\) indicates a range of \(N_{h}\) best responses collected jointly.
Attacking prey (exploitation): The procedure of prey attack is mentioned below in the mathematical formulation:
Here, \({v}_{h}(x+1)\) is in the control of protecting the finest response and adapting the positions of other origins depending upon the finest search element location.
Search for prey (exploration): To discover the correct resolution, the \(Z\) value should be higher or lesser than one. \(Y\) is one more SHOA module, which aids with exploration. The \(Y\) contains of produced value at random, which allocates random weight to the victim. In the vector of Y, the elements that are larger than 1 are assumed larger priority than those lesser than 1.
Adaptive stopping criterion: This step is combined into the major circle of SHOA, naturally behind the development of iteration is observed and upgraded. This check is executed at the finale of every iteration to define whether to stop additional iteration. By integrating this criterion, we can enhance its efficacy and stop excessive calculation in the objective function.
If \(\left|f\left({v}_{h,best}\left(j\right)\right)-f\left({v}_{h,best}\left(j-1\right)\right)\right|<e\) for \(k\) consecutive iteration, then the algorithm ends and yields a response. Here \(\epsilon\) denotes a smaller value of the positive threshold, \(f\left({v}_{h,best}\left(j\right)\right)\) represents the value of the objective function at \(jth\) iteration, \(k\) signifies the amount of consecutive iterations. The condition verifies if the development drops under a threshold \(\epsilon\) over a specified amount of consecutive iterations, representing latent convergence or absence of major development. By overwhelming down the steps drawn in the algorithm, it provides clarity and enables the ability of the developed technique. This method creates the execution of the SHOA handier, certifying that every step is well-defined. During the SHOA, the purposes can be combined as a single objective that an existing weight recognizes all the objective positions. In this case, it is implemented a fitness function (FF) that integrates both ideas of FS as depicted in Eq. (12).
Here, \(Fitness(X)\) defines the fitness value of subset \(X,\) \(E(X)\) demonstrates the classifier value of errors by employing the preferred features from the X subset, \(|R|\) and \(|N|\) signifies the preferred feature counts and the number of new features from the database, \(\alpha\) and \(\beta\) implies the weighted of classifier error and the ratio of reduction.
Disease detection using ABiGRU classifier
Besides, the ABiGRU method is employed for disease recognition and classification36. This method is chosen due to its ability to effectually capture temporal dependencies and contextual data in sequential healthcare data. Unlike standard RNNs or unidirectional GRUs, the bidirectional structure processes information in both forward and backward directions, improving the comprehension of complex patterns. The integrated attention mechanism enhances performance by allowing the model to focus on the most relevant features in the input sequence. Compared to CNNs or conventional ML classifiers, ABiGRU performs better on time series or structured health records. Its efficiency, lower computational cost than LSTMs, and enhanced interpretability make it ideal for accurate and explainable disease classification. Figure 3 depicts the infrastructure of ABiGRU.
Architecture of ABiGRU model.
As an alternative to GRU, RNNs and LSTM represent a gate mechanism to avoid the gradient vanishing and explosion difficulties in traditional RNNs. Based on LSTM, GRU improves the gate structure and facilitates input and output, and forget gates are converted into update and reset gates that upsurge computational efficacy and reduce the number of parameters.
The reset gate \({r}_{t}\) describes how much past data is to be disregarded. The update gate \({Z}_{t}\) creates the number of preceding data, which will be distributed on later. The sigmoid function can be expressed by \(\sigma ;{x}_{t}\) denotes the input at \(t\) time the weighted matrices of the hidden layer (HL), update gate, and reset gate are \(W,{W}_{z}\), and \({W}_{r}\) respectively; \({h}_{t-1}\) signifies the state of HL at \(t-1\) time; \({\widetilde{h}}_{t}\) mentions to the sum of the past and current state of HL at time \(t\); and \({h}_{t}\) represents the HL output. The unidirectional GRU is frequently outputted from front to back and can’t take the involvement of succeeding information to the semantics. Bi-GRU attains text data from both directions and utilizes it as the final output.
The current input \({x}_{t}\) states the current Bi-GRU state of HL; the reverse and the forward state of HL outputs at \(t-1\) time are \(\overleftarrow{{h}_{t-1}}\) and \(\overrightarrow{{h}_{t-1}}\). The Bi‐GRU can be separated into dual one-way GRUs, and the Bi‐GRU state of HL at \(t\) time is obtained by the weighting sum of \({\overleftarrow{h}}_{t-1}\) and \({\overrightarrow{h}}_{t-1}\):
Here, the GRU() function signifies the input word vector non‐linear conversion and encodes them into the corresponding state of HL. \(w_{t}\) and \(v_{t}\) are the weights compared to the \(\vec{h}_{t}\) and \(\mathop{h}\limits^{\leftarrow} _{t}\) (HLs), respectively, and \(b_{t}\) means the bias to the state of HL at \(t\) time.
While the word vectors \(x_{1} ,x_{t - 1} ,x_{t}\), and \(x_{n}\) output the feature vectors of HL \(h_{1} ,h_{t - 1} ,h_{t}\), and \(h_{n}\) by the Bi‐GRU and multiply it with the \(a_{1} ,a_{t - 1} ,a_{t}\), and \(a_{n}\) weighted coefficients and gather them as an output \(V\) of the attention layer and it is computed as.
where the state vector of HL can be denoted as \({e}_{\iota }\) is. \({w}_{\iota }\) and \({v}_{\iota }\) specify the weight coefficient matrices. \({b}_{\iota }\) states to the bias. The attention score \({a}_{\iota }\) defines the word significance to the sentence. \(V\) symbolizes the output vector of the weighted amount of all the words.
MCOA-based parameter tuning
Eventually, the hyperparameter selection of the ABiGRU model is performed by implementing the MCOA technique37. This model is chosen due to its improved capability to balance exploration and exploitation during the search process. Inspired by the natural behaviour of coatis, MCOA introduces modifications that improve convergence speed and solution accuracy compared to standard optimization methods like grid search, random search, or even conventional metaheuristics such as GA and PSO. It efficiently navigates complex hyperparameter spaces, mitigating the risk of getting trapped in local optima. The model’s adaptability and dynamic search capability make it specifically effectual for DL models, where optimal parameter selection is significant for optimizing performance. Its usage results in enhanced model generalization, reduced overfitting, and improved prediction accuracy in disease detection tasks. Figure 4 demonstrates the working flow of the MCOA method.
Flow of the MCOA technique.
The COA is a new optimization technique stimulated by the coatis’ evasion and predatory behaviours. The method is separated into dual stages. For example, the first stage pretends the coatis’ catching iguanas, which signifies the exploration behaviour; the second stage pretends the coatis’ behaviour of evading predators, which represents the exploitation behaviour.
Hunting and attacking strategy
When coatis search iguanas, they use to perform in clusters. This hunting tactic splits the population of coati into dual parts, each one hunting for prey. In COA, it is highly expected that 50 percent of coatis climb trees to catch iguanas, while the remaining stay on the ground to catch the falling iguanas. The mathematical formulation is mentioned below:
where \({x}_{i,j}^{P1}\) signifies the \(j\)th dimension of the \(i\)th coati in the first phase; \(Xbes{t}_{j}\) signifies the \(j\)th dimension of the finest solution; \(I\) denotes a randomly produced values {1, 2}. When the iguanas fall to the ground, the coatis endure to search the iguanas.
where \({X}^{G}\) signifies the produced location at random of the iguana; \(l{b}_{j}\) and \(u{b}_{j}\) signifies the lower and upper limit of the \(jth\) dimension, respectively; \(r\) means the randomly generated value in \([\text{0,1}].\)
Here \(I\) denotes a randomly produced value of {1, 2}; \(r\) means the generated value at random in \(\left[\text{0,1}\right];\) \({F}_{{X}^{G}}\) and \({F}_{i}\) signifies the value of the cost function of the recently produced iguana place and original population, respectively; \(r\) means a randomly generated value in the interval of \(\left(\text{0,1}\right);\) and \({x}_{i,j}\) signifies the \(jth\) dimension of \(ith\) individual data. The novel location will be upgraded in the population as presented in Eq. (24).
where \({X}_{i}\) signifies the location of \(ith\) coatis; \({X}_{i}^{P1}\) epitomizes the location that the coatis noticed in stage 1; \(F\) means the cost value consistent with the location of the coatis.
The procedure of escaping from predators
When coatis are followed by hunters, they arbitrarily jump to nearby locations to avoid them. This procedure is pretend by the below-mentioned formulation:
where \(l{b}_{j}^{local}\) and \(u{b}_{j}^{local}\) represents the escape range and \({X}_{i}^{P2}\) signifies the location after the coatis were harassed.
Here, \({X}_{i}\) means the location of the \(ith\) coatis; \({X}_{i}^{P2}\) signifies the location that the coatis noticed in stage 2; and \(F\) represents the cost value.
In the predation stage, the COA evades dividing the population into dual portions: the first part upgrades individuals directed by the finest value, and the other part upgrades the technique by utilizing randomly generated values. The outcomes perceived by these dual parts are dissimilar, but the technique does not completely use this dissimilar information. The COA’s model of examining the finest solution is quite easy, which might not be adequate to get higher‐quality routes. Dynamic opposite learning (DOL) is an enhanced approach that depends upon opposition‐based learning (OBL). The mathematical formulation is mentioned below:
whereas \({x}^{o}\) denotes an opposite operator, \(a\) represents the lower limit, \(b\) signifies the upper limit. After the population finishes its respective predation, the remaining population does differential DOL, and its upgrade formulation is mentioned below:
Here, \({X}_{i}^{1}\) corresponds to the \(ith\) individual in the pre half population. When upgrading the \(ith\) individual in \({X}_{i}^{2}\), the equivalent \({X}_{i}^{op}\) denotes the \(ith\) individual in the later half population. When upgrading the \(ith\) individual in \({X}^{2}\), the equivalent \({X}_{i}^{op}\) represents the \(ith\) individual in the pre half population. \({r}_{c}\) denotes a randomly generated value. The fitness choice is a great influence the effectiveness of MCOA. The parameter tuning contains the encoded method for evaluating the effectiveness of candidate outcomes. In this case, the MCOA assumes that accuracy as a primary condition to plan FF that is expressed as:
where FP and TP define the false and true positive values.
Experimental result and analysis
This section examines the performance validation of the MCODBC-HDDC model under the HD dataset38. The technique is simulated using Python 3.6.5 on a PC with an i5-8600k, 250GB SSD, GeForce 1050Ti 4GB, 16GB RAM, and 1TB HDD. Parameters include a learning rate of 0.01, ReLU activation, 50 epochs, 0.5 dropouts, and a batch size of 5. The dataset comprises 303 samples under two classes, as shown in Table 2. Also, the dataset contains 14 features, including age, sex, cp, trestbps, chol, fbs, restecg, thalach, exang, oldpeak, slope, ca, thal, and num. From these, nine features were selected: age, sex, cp, trestbps, fbs, exang, oldpeak, slope, and num.
Figure 5 illustrates the confusion matrices achieved by the MCODBC-HDDC methodology under 500–3000 epochs. The outcomes implied that the MCODBC-HDDC model effectively recognizes the presence and absence of instances under all classes.
Confusion matrices of MCODBC-HDDC model (a–f) Epochs 500–3000.
Table 3 and Fig. 6 indicate the overall classification outcomes of the MCODBC-HDDC technique. The results stated that the MCODBC-HDDC technique properly recognized varied classes. With 500 epochs, the MCODBC-HDDC technique presents an average accu_y, prec_n, reca_l, F_measure, MCC, and Kappa of 92.98%, 92.66%, 92.98%, 92.72%, 85.64%, and 85.70%, correspondingly. Also, with 2000 epochs, the MCODBC-HDDC technique attains an average accu_y, prec_n, reca_l, F_measure, MCC, and Kappa of 94.80%, 94.62%, 94.80%, 94.69%, 89.41%, and 89.49%, correspondingly. Besides, with 3000 epochs, the MCODBC-HDDC approach attains an average accu_y, prec_n, reca_l, F_measure, and MCC of 97.36%, 97.48%, 97.22%, 97.33%, 94.70%, and 94.77%, subsequently.
Overall classification outcome of MCODBC-HDDC technique under 500–3000 epochs.
In Fig. 7, the TRA \(acc{u}_{y}\) (TRAAC) and validation \(acc{u}_{y}\) (VLAAC) outcomes of the MCODBC-HDDC approach are established. The \(acc{u}_{y}\) values are computed under intervals of 0–3000 epochs. The result showed that the TRAAC and VLAAC values exhibit an increasing tendency, which informed the proficiency of the MCODBC-HDDC technique, with improved outcomes at various iterations.
\(Acc{u}_{y}\) curve of MCODBC-HDDC model under 3000 epochs.
Figure 8 illustrates the MCODBC-HDDC technique’s TRA loss (TRALS) and VLA loss (VLALS) graph. The loss values are designed under intervals of 0–3000 epochs. The TRALS and VLALS outcomes exemplify a reducing tendency, which indicates the approach’s ability to balance a trade-off between generalized and data fitting.
Loss curve of MCODBC-HDDC model under 3000 epochs.
To exemplify the better performance of the MCODBC-HDDC approach, a brief comparison study is made in Table 4 and Fig. 918,39. The table values represented that the k-nearest neighbours (kNN), SVM, and NN approaches illustrated lesser classification performances. Likewise, the radial basis function (RBF), SCA-WKNN, and multilayer perceptron (MLP) approaches have tried to realize somewhat closer classification outcomes. Additionally, the random forest (RF) method has exhibited reasonable outcomes with \(acc{u}_{y}\) of 96.28%, \(pre{c}_{n}\) of 96.28%, \(rec{a}_{l}\) of 95.37%, and \({F}_{measure}\) of 96.68%. However, the MCODBC-HDDC methodology determines promising performance with \(acc{u}_{y}\) of 97.36%, \(pre{c}_{n}\) of 97.48%, \(rec{a}_{l}\) of 97.22%, and \({F}_{measure}\) of 97.33%.
Comparison analysis of MCODBC-HDDC approach with existing methods.
The computational time (CT) of the MCODBC-HDDC approach can be compared with existing models in Table 5 and Fig. 10. The outcomes highlighted that the SVM, RF, and NN methods have obtained worse performance with higher CT of 24.43s, 20.42s, and 19.16s, correspondingly. Followed by, the KNN, SCA-WKNN, and RBF systems have reported closer CT values of 18.48s, 12.06s, and 11.90s, correspondingly. In the meantime, the MLP model has managed to report a considerable CT of 10.97s. Nevertheless, the MCODBC-HDDC technique demonstrated superior performance with a lower CT of 8.55s.
CT outcome of MCODBC-HDDC technique with other algorithms.
Table 6 and Fig. 11 specify the ablation study of the MCODBC-HDDC approach. The SHOA method demonstrated robust performance with an \(acc{u}_{y}\) of 95.30, \(pre{c}_{n}\) of 95.56, \(rec{a}_{l}\) of 95.51, and an F-measure of 95.34. MCOA improved upon SHOA with an \(acc{u}_{y}\) of 95.96, \(pre{c}_{n}\) of 96.20, \(rec{a}_{l}\) of 96.04, and a \({F}_{measure}\) of 95.90. ABiGRU improved these metrics, achieving an \(acc{u}_{y}\) of 96.57, \(pre{c}_{n}\) of 96.96, \(rec{a}_{l}\) of 96.55, and a \({F}_{measure}\) of 96.53. MCODBC-HDDC method outperformed all other methods, attaining an \(acc{u}_{y}\) of 97.36, \(pre{c}_{n}\) of 97.48, \(rec{a}_{l}\) of 97.22, and a \({F}_{measure}\) of 97.33. This study demonstrates the efficiency of these methods, specifically the MCODBC-HDDC model, in improving classification metrics for the given task.
Result analysis of the ablation study of MCODBC-HDDC approach.
Conclusions
In this manuscript, the MCODBC-HDDC method is proposed. The presented MCOBC-HDDC method provides an efficient and accurate disease diagnosis, utilizing a system based on DL techniques. To accomplish that, the MCODBC-HDDC method incorporates BC technology to ensure secure data sharing and management, providing a decentralized and tamper-proof environment for patient data. In the data preprocessing stage, the MCODBC-HDDC model employs Z-score normalization to standardize the data and improve performance. The SHOA is used to obtain the optimal subset of features. Besides, the ABiGRU method is implemented for disease detection and classification. Finally, the hyperparameter selection of the ABiGRU model is performed by utilizing the MCOA method. The experimental analysis of the MCODBC-HDDC approach is examined under the HD dataset. The performance validation of the MCODBC-HDDC approach portrayed a superior accuracy value of 97.36% over existing models. The limitations of the MCODBC-HDDC approach comprise the reliance on semi-synthetic datasets, which, while useful for controlled evaluation, may not fully capture the complexities of real-world clinical environments. The model’s performance may vary when applied to unstructured data sources, such as free-text medical notes or multi-modal records. Additionally, the model shows limitations in its adaptability in continuous monitoring scenarios. Future work may integrate real-time data streams and incorporate multi-source clinical data to improve model robustness. Expanding the model’s applicability across diverse healthcare systems and demographic groups is also a priority. Further research may explore the ethical and privacy considerations in deploying such intelligent systems in clinical practice. Validation using real-world, large-scale datasets will be pursued to assess practical effectiveness and scalability.
Data availability
The authors confirm that the data supporting the findings of this study are available within the article.
References
Golande, A. & Pavan Kumar, T. Heart disease prediction using effective machine learning techniques. Int. J. Recent Technol. Eng. IJRTE 8, 944–950 (2019).
Sharma, S. & Parmar, M. Heart diseases prediction using deep learning neural network model. Int. J. Innov. Technol. Explor. Eng. IJITEE 9, 124–137 (2020).
Arunpradeep, N. & Niranjana, G. Different machine learning models based heart disease prediction. Int. J. Recent Technol. Eng. IJRTE 8, 544–548 (2020).
Ravindhar, N. V., Anand, H. S. & Ragavendran, G. W. Intelligent diagnosis of cardiac disease prediction using machine learning. Int. J. Innov. Technol. Explor. Eng. 8, 1417–1421 (2019).
Tanriverdi, M. A systematic review of privacy preserving healthcare data sharing on blockchain. J. Cybersecur. Inf. Manag. 5, 31–37. https://doi.org/10.54216/JCIM.040203 (2020).
Mohan, S., Thirumalai, C. & Srivastava, G. Effective heart disease prediction using hybrid machine learning techniques. IEEE Access 7, 81542–81554 (2019).
Chattu, V. K. A review of artificial intelligence Big Data and blockchain technology applications in medicine and global health. Big Data Cogn. Comput. 5, 41 (2021).
Chen, L., Lee, W. K., Chang, C. C., Choo, K. K. R. & Zhang, N. Blockchain based searchable encryption for electronic health record sharing. Future Gener. Comput. Syst. 95, 420–429 (2019).
Kumar, R. et al. An integration of blockchain and AI for secure data sharing and detection of CT images for the hospitals. Comput. Med. Imaging Graph. 87, 101812 (2021).
Waigi, R., Choudhary, S., Fulzele, P. & Mishra, G. Predicting the risk of heart disease using advanced machine learning approach. Eur. J. Mol. Clin. Med. 7, 1638–1645 (2020).
Ragab, M. et al. Blockchain-driven privacy preserving electronic health records analysis using sine cosine algorithm with deep learning model. Hum. Centric Comput. Inf. Sci. 14, 9 (2024).
Ali, A. et al. Blockchain-powered healthcare systems: Enhancing scalability and security with hybrid deep learning. Sensors 23(18), 7740 (2023).
Alanazi, A. A., Karim, F. K., Ghorashi, S. A., Amoudi, G. & Hamza, S. H. A. Blockchain with optimal deep learning assisted secure data sharing and classification on future healthcare systems. Alex. Eng. J. 99, 168–179 (2024).
Alamro, H. et al. Modelling of blockchain assisted intrusion detection on IoT healthcare system using ant lion optimizer with hybrid deep learning. IEEE Access 11, 82199–82207 (2023).
Mohananthini, N., Rajeshkumar, K. & Ananth, C. Enhancing heart disease detection and classification using fuzzy logic and metaheuristic algorithms in a blockchain assisted healthcare environment. J. Intell. Fuzzy Syst. 46(2), 5329–5342 (2024).
Qu, Z., Shi, W., Liu, B., Gupta, D. & Tiwari, P. IoMT-based smart healthcare detection system driven by quantum blockchain and quantum neural network. IEEE J. Biomed. Health Inform. 28(6), 3317–3328 (2023).
Naveen, V. E., Dhivya, S. & Jenefa, A. DenseNet melanoma classification in blockchain-driven healthcare. In Blockchain for Biomedical Research and Healthcare: Concept, Trends, and Future Implications 99–122 (Springer, 2024).
Kateb, F. et al. Improved security for IoT-based remote healthcare systems using deep learning with jellyfish search optimization algorithm. Sci. Rep. 15(1), 13223 (2025).
Rahal, H. R., Slatnia, S., Kazar, O., Barka, E. & Harous, S. Blockchain-based multi-diagnosis deep learning application for various diseases classification. Int. J. Inf. Secur. 23(1), 15–30 (2024).
Hota, A., Biswas, A., Saha, S., Barman, A. K. & Nag, A. Blockchain and deep learning-based approach towards privacy preserving healthcare solutions. Multimed. Tools Appl. 1–31 (2025).
Rokade, S. & Mishra, N. A blockchain-based deep learning system with optimization for skin disease classification. Biomed. Signal Process. Control 95, 106380 (2024).
Islam, M. A. et al. Harnessing predictive analytics: The role of machine learning in early disease detection and healthcare optimization. J. Ecohumanism 4(3), 312–321 (2025).
Shammi, S. A. et al. Advances in artificial intelligence and blockchain technologies for early detection of human diseases. IEEE Trans. Computat. Soc. Syst. 12, 210–237 (2024).
Matlo, M. A., Siddiqui, A. A., Siddiqui, S. A., Mastoi, Q. U. A. & Lakhan, A. A novel blockchain proof of validation scheme based on explainable AI for healthcare workload. VAWKUM Trans. Comput. Sci. 13(1), 54–67 (2025).
Khan, A. R. & Jilani, A. K. Privacy-enhanced heart disease prediction in cloud-based healthcare systems: A deep learning approach with blockchain-based transmission. Fusion Pract. Appl. 15(1), 98 (2024).
Kulkarni, D. Y. R., Sugave, D. S., Jagdale, D. B. & Gutte, V. Spinal PMDMNN: A new blockchain-based IOT network for healthcare classification. Aust. J. Electr. Electron. Eng. 1–15 (2025).
Gupta, M., Kumar, M. & Gupta, Y. A blockchain-empowered federated learning-based framework for data privacy in lung disease detection system. Comput. Hum. Behav. 158, 108302 (2024).
Ahmed, S. J., Atham, S. B., Kadhim, H., Gupta, D., Majed, A. E. M. & Faizal, M. M. Enhancing smart healthcare services through deep learning-based medical data analysis. In 2025 3rd International Conference on Intelligent Systems, Advanced Computing and Communication (ISACC) 666–671 (IEEE, 2025).
Dubey, A. K., Kapoor, R. & Saraswat, M. Optimized machine learning for medical data analysis and disease prediction. In 2024 International Conference on Artificial Intelligence and Emerging Technology (Global AI Summit) 1282–1286 (IEEE, 2024).
Chougule, P. A., Sarumathi, S., Kant, R., Gupta, R. K., Latha, U. P. & Perada, A. Blockchain-based secure cloud storage for IoT healthcare using BiGRU and BiLSTM models. In 2025 3rd International Conference on Integrated Circuits and Communication Systems (ICICACS) 1–6 (IEEE, 2025).
Al-Marridi, A. Z., Mohamed, A. & Erbad, A. Optimized blockchain-based healthcare framework empowered by mixed multi-agent reinforcement learning. J. Netw. Comput. Appl. 224, 103834 (2024).
Pradhan, A. K. et al. Application of machine learning in healthcare IoT: An investigation on disease diagnosis and analytic cases. In Exploration of Transformative Technologies in Healthcare 6.0 197–220 (IGI Global Scientific Publishing, 2025).
Hasanova, H., Tufail, M., Baek, U. J., Park, J. T. & Kim, M. S. A novel blockchain-enabled heart disease prediction mechanism using machine learning. Comput. Electr. Eng. 101, 108086 (2022).
Talukder, M. A. et al. Machine learning-based network intrusion detection for big and imbalanced data using oversampling, stacking feature embedding and feature extraction. J. Big Data 11(1), 33 (2024).
Yuvaraj, T. et al. Dynamic optimization and placement of renewable generators and compensators to mitigate electric vehicle charging station impacts using the spotted hyena optimization algorithm. Sustainability 16(19), 8458 (2024).
Vaiyapuri, T. et al. IoT-enabled early detection of diabetes diseases using deep learning and dimensionality reduction techniques. IEEE Access 12, 143016–143028 (2024).
Miao, F., Li, H. & Mei, X. Three-dimensional path planning of UAVs for offshore rescue based on a modified coati optimization algorithm. J. Mar. Sci. Eng. 12(9), 1676 (2024).
Hassan, C. A. U. et al. Effectively predicting the presence of coronary heart disease using machine learning classifiers. Sensors 22(19), 7227 (2022).
Funding
This work was funded by the Deanship of Scientific Research at Princess Nourah bint Abdulrahman University, through the Research Groups Program Grant No. (RGP-1443–0048).
Author information
Authors and Affiliations
Contributions
The authors confirm contribution to the paper as follows: Conceptualization, H.G.M. and F.N.A.; methodology, F.A.; software, F.N.A.; validation, A.M., A.M.H. and M.A.; formal analysis, M.A.; investigation, F.A.; resources, F.N.A.; data curation, A.M.H.; writing—original draft preparation, A.M.; writing—review and editing, F.A.; visualization, F.N.A.; supervision, F.A.; project ad-ministration H.G.M.; funding acquisition, H.G.M. All authors reviewed the results and approved the final version of the manuscript”.
Corresponding author
Ethics declarations
Competing interests
The authors declare no competing interests.
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article’s Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article’s Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/.
About this article
Cite this article
Mohamed, H.G., Alrowais, F., Al-Wesabi, F.N. et al. Blockchain enabled deep learning model with modified coati optimization for sustainable healthcare disease detection and classification. Sci Rep 15, 21058 (2025). https://doi.org/10.1038/s41598-025-06578-6
Received:
Accepted:
Published:
Version of record:
DOI: https://doi.org/10.1038/s41598-025-06578-6













