Displaying publications 1 - 20 of 52 in total

Abstract:
Sort:
  1. Zaidan BB, Haiqi A, Zaidan AA, Abdulnabi M, Kiah ML, Muzamel H
    J Med Syst, 2015 May;39(5):51.
    PMID: 25732083 DOI: 10.1007/s10916-015-0235-1
    This study focuses on the situation of health information exchange (HIE) in the context of a nationwide network. It aims to create a security framework that can be implemented to ensure the safe transmission of health information across the boundaries of care providers in Malaysia and other countries. First, a critique of the major elements of nationwide health information networks is presented from the perspective of security, along with such topics as the importance of HIE, issues, and main approaches. Second, a systematic evaluation is conducted on the security solutions that can be utilized in the proposed nationwide network. Finally, a secure framework for health information transmission is proposed within a central cloud-based model, which is compatible with the Malaysian telehealth strategy. The outcome of this analysis indicates that a complete security framework for a global structure of HIE is yet to be defined and implemented. Our proposed framework represents such an endeavor and suggests specific techniques to achieve this goal.
  2. Zaidan AA, Zaidan BB, Kadhem Z, Larbani M, Lakulu MB, Hashim M
    J Med Syst, 2015 Feb;39(2):7.
    PMID: 25631841 DOI: 10.1007/s10916-015-0201-y
    This paper discusses the possibility of promoting public health and implementing educational health services using Facebook. We discuss the challenges and strengths of using such a platform as a tool for public health care systems from two different perspectives, namely, the view of IT developers and that of physicians. We present a new way of evaluating user interactivity in health care systems from tools provided by Facebook that measure statistical traffic in the Internet. Findings show that Facebook is a very promising tool in promoting e-health services in Web 2.0. Results from statistical traffic show that a Facebook page is more efficient than other pages in promoting public health.
  3. Zaidan AA, Zaidan BB, Al-Haiqi A, Kiah ML, Hussain M, Abdulnabi M
    J Biomed Inform, 2015 Feb;53:390-404.
    PMID: 25483886 DOI: 10.1016/j.jbi.2014.11.012
    Evaluating and selecting software packages that meet the requirements of an organization are difficult aspects of software engineering process. Selecting the wrong open-source EMR software package can be costly and may adversely affect business processes and functioning of the organization. This study aims to evaluate and select open-source EMR software packages based on multi-criteria decision-making. A hands-on study was performed and a set of open-source EMR software packages were implemented locally on separate virtual machines to examine the systems more closely. Several measures as evaluation basis were specified, and the systems were selected based a set of metric outcomes using Integrated Analytic Hierarchy Process (AHP) and TOPSIS. The experimental results showed that GNUmed and OpenEMR software can provide better basis on ranking score records than other open-source EMR software packages.
  4. Talal M, Zaidan AA, Zaidan BB, Albahri AS, Alamoodi AH, Albahri OS, et al.
    J Med Syst, 2019 Jan 15;43(3):42.
    PMID: 30648217 DOI: 10.1007/s10916-019-1158-z
    The Internet of Things (IoT) has been identified in various applications across different domains, such as in the healthcare sector. IoT has also been recognised for its revolution in reshaping modern healthcare with aspiring wide range prospects, including economical, technological and social. This study aims to establish IoT-based smart home security solutions for real-time health monitoring technologies in telemedicine architecture. A multilayer taxonomy is driven and conducted in this study. In the first layer, a comprehensive analysis on telemedicine, which focuses on the client and server sides, shows that other studies associated with IoT-based smart home applications have several limitations that remain unaddressed. Particularly, remote patient monitoring in healthcare applications presents various facilities and benefits by adopting IoT-based smart home technologies without compromising the security requirements and potentially large number of risks. An extensive search is conducted to identify articles that handle these issues, related applications are comprehensively reviewed and a coherent taxonomy for these articles is established. A total number of (n = 3064) are gathered between 2007 and 2017 for most reliable databases, such as ScienceDirect, Web of Science and Institute of Electrical and Electronic Engineer Xplore databases. Then, the articles based on IoT studies that are associated with telemedicine applications are filtered. Nine articles are selected and classified into two categories. The first category, which accounts for 22.22% (n = 2/9), includes surveys on telemedicine articles and their applications. The second category, which accounts for 77.78% (n = 7/9), includes articles on the client and server sides of telemedicine architecture. The collected studies reveal the essential requirement in constructing another taxonomy layer and review IoT-based smart home security studies. Therefore, IoT-based smart home security features are introduced and analysed in the second layer. The security of smart home design based on IoT applications is an aspect that represents a crucial matter for general occupants of smart homes, in which studies are required to provide a better solution with patient security, privacy protection and security of users' entities from being stolen or compromised. Innovative technologies have dispersed limitations related to this matter. The existing gaps and trends in this area should be investigated to provide valuable visions for technical environments and researchers. Thus, 67 articles are obtained in the second layer of our taxonomy and are classified into six categories. In the first category, 25.37% (n = 17/67) of the articles focus on architecture design. In the second category, 17.91% (n = 12/67) includes security analysis articles that investigate the research status in the security area of IoT-based smart home applications. In the third category, 10.44% (n = 7/67) includes articles about security schemes. In the fourth category, 17.91% (n = 12/67) comprises security examination. In the fifth category, 13.43% (n = 9/67) analyses security protocols. In the final category, 14.92% (n = 10/67) analyses the security framework. Then, the identified basic characteristics of this emerging field are presented and provided in the following aspects. Open challenges experienced on the development of IoT-based smart home security are addressed to be adopted fully in telemedicine applications. Then, the requirements are provided to increase researcher's interest in this study area. On this basis, a number of recommendations for different parties are described to provide insights on the next steps that should be considered to enhance the security of smart homes based on IoT. A map matching for both taxonomies is developed in this study to determine the novel risks and benefits of IoT-based smart home security for real-time remote health monitoring within client and server sides in telemedicine applications.
  5. Shuwandy ML, Zaidan BB, Zaidan AA, Albahri AS
    J Med Syst, 2019 Jan 06;43(2):33.
    PMID: 30612191 DOI: 10.1007/s10916-018-1149-5
    The new and groundbreaking real-time remote healthcare monitoring system on sensor-based mobile health (mHealth) authentication in telemedicine has considerably bounded and dispersed communication components. mHealth, an attractive part in telemedicine architecture, plays an imperative role in patient security and privacy and adapts different sensing technologies through many built-in sensors. This study aims to improve sensor-based defence and attack mechanisms to ensure patient privacy in client side when using mHealth. Thus, a multilayer taxonomy was conducted to attain the goal of this study. Within the first layer, real-time remote monitoring studies based on sensor technology for telemedicine application were reviewed and analysed to examine these technologies and provide researchers with a clear vision of security- and privacy-based sensors in the telemedicine area. An extensive search was conducted to find articles about security and privacy issues, review related applications comprehensively and establish the coherent taxonomy of these articles. ScienceDirect, IEEE Xplore and Web of Science databases were investigated for articles on mHealth in telemedicine-based sensor. A total of 3064 papers were collected from 2007 to 2017. The retrieved articles were filtered according to the security and privacy of sensor-based telemedicine applications. A total of 19 articles were selected and classified into two categories. The first category, 57.89% (n = 11/19), included survey on telemedicine articles and their applications. The second category, 42.1% (n = 8/19), included articles contributed to the three-tiered architecture of telemedicine. The collected studies improved the essential need to add another taxonomy layer and review the sensor-based smartphone authentication studies. This map matching for both taxonomies was developed for this study to investigate sensor field comprehensively and gain access to novel risks and benefits of the mHealth security in telemedicine application. The literature on sensor-based smartphones in the second layer of our taxonomy was analysed and reviewed. A total of 599 papers were collected from 2007 to 2017. In this layer, we obtained a final set of 81 articles classified into three categories. The first category of the articles [86.41% (n = 70/81)], where sensor-based smartphones were examined by utilising orientation sensors for user authentication, was used. The second category [7.40% (n = 6/81)] included attack articles, which were not intensively included in our literature analysis. The third category [8.64% (n = 7/81)] included 'other' articles. Factors were considered to understand fully the various contextual aspects of the field in published studies. The characteristics included the motivation and challenges related to sensor-based authentication of smartphones encountered by researchers and the recommendations to strengthen this critical area of research. Finally, many studies on the sensor-based smartphone in the second layer have focused on enhancing accurate authentication because sensor-based smartphones require sensors that could authentically secure mHealth.
  6. Mohsin AH, Zaidan AA, Zaidan BB, Albahri AS, Albahri OS, Alsalem MA, et al.
    J Med Syst, 2018 Oct 16;42(12):238.
    PMID: 30327939 DOI: 10.1007/s10916-018-1104-5
    The development of wireless body area sensor networks is imperative for modern telemedicine. However, attackers and cybercriminals are gradually becoming aware in attacking telemedicine systems, and the black market value of protected health information has the highest price nowadays. Security remains a formidable challenge to be resolved. Intelligent home environments make up one of the major application areas of pervasive computing. Security and privacy are the two most important issues in the remote monitoring and control of intelligent home environments for clients and servers in telemedicine architecture. The personal authentication approach that uses the finger vein pattern is a newly investigated biometric technique. This type of biometric has many advantages over other types (explained in detail later on) and is suitable for different human categories and ages. This study aims to establish a secure verification method for real-time monitoring systems to be used for the authentication of patients and other members who are working in telemedicine systems. The process begins with the sensor based on Tiers 1 and 2 (client side) in the telemedicine architecture and ends with patient verification in Tier 3 (server side) via finger vein biometric technology to ensure patient security on both sides. Multilayer taxonomy is conducted in this research to attain the study's goal. In the first layer, real-time remote monitoring studies based on the sensor technology used in telemedicine applications are reviewed and analysed to provide researchers a clear vision of security and privacy based on sensors in telemedicine. An extensive search is conducted to identify articles that deal with security and privacy issues, related applications are reviewed comprehensively and a coherent taxonomy of these articles is established. ScienceDirect, IEEE Xplore and Web of Science databases are checked for articles on mHealth in telemedicine based on sensors. A total of 3064 papers are collected from 2007 to 2017. The retrieved articles are filtered according to the security and privacy of telemedicine applications based on sensors. Nineteen articles are selected and classified into two categories. The first category, which accounts for 57.89% (n = 11/19), includes surveys on telemedicine articles and their applications. The second category, accounting for 42.1% (n = 8/19), includes articles on the three-tiered architecture of telemedicine. The collected studies reveal the essential need to construct another taxonomy layer and review studies on finger vein biometric verification systems. This map-matching for both taxonomies is developed for this study to go deeply into the sensor field and determine novel risks and benefits for patient security and privacy on client and server sides in telemedicine applications. In the second layer of our taxonomy, the literature on finger vein biometric verification systems is analysed and reviewed. In this layer, we obtain a final set of 65 articles classified into four categories. In the first category, 80% (n = 52/65) of the articles focus on development and design. In the second category, 12.30% (n = 8/65) includes evaluation and comparative articles. These articles are not intensively included in our literature analysis. In the third category, 4.61% (n = 3/65) includes articles about analytical studies. In the fourth category, 3.07% (n = 2/65) comprises reviews and surveys. This study aims to provide researchers with an up-to-date overview of studies that have been conducted on (user/patient) authentication to enhance the security level in telemedicine or any information system. In the current study, taxonomy is presented by explaining previous studies. Moreover, this review highlights the motivations, challenges and recommendations related to finger vein biometric verification systems and determines the gaps in this research direction (protection of finger vein templates in real time), which represent a new research direction in this area.
  7. Mohsin AH, Zaidan AA, Zaidan BB, Ariffin SAB, Albahri OS, Albahri AS, et al.
    J Med Syst, 2018 Oct 29;42(12):245.
    PMID: 30374820 DOI: 10.1007/s10916-018-1103-6
    In real-time medical systems, the role of biometric technology is significant in authentication systems because it is used in verifying the identity of people through their biometric features. The biometric technology provides crucial properties for biometric features that can support the process of personal identification. The storage of biometric template within a central database makes it vulnerable to attack which can also occur during data transmission. Therefore, an alternative mechanism of protection becomes important to develop. On this basis, this study focuses on providing a detailed analysis of the extant literature (2013-2018) to identify the taxonomy and research distribution. Furthermore, this study also seeks to ascertain the challenges and motivations associated with biometric steganography in real-time medical systems to provide recommendations that can enhance the efficient use of real-time medical systems in biometric steganography and its applications. A review of articles on human biometric steganography in real-time medical systems obtained from three main databases (IEEE Xplore, ScienceDirect and Web of Science) is conducted according to an appropriate review protocol. Then, 41 related articles are selected by using exclusion and inclusion criteria. Majority of the studies reviewed had been conducted in the field of data-hiding (particularly steganography) technologies. In this review, various steganographic methods that have been applied in different human biometrics are investigated. Thereafter, these methods are categorised according to taxonomy, and the results are presented on the basis of human steganography biometric real-time medical systems, testing and evaluation methods, significance of use and applications and techniques. Finally, recommendations on how the challenges associated with data hiding can be addressed are provided to enhance the efficiency of using biometric information processed in any authentication real-time medical system. These recommendations are expected to be immensely helpful to developers, company users and researchers.
  8. Mohsin AH, Zaidan AA, Zaidan BB, Albahri OS, Albahri AS, Alsalem MA, et al.
    J Med Syst, 2019 May 22;43(7):192.
    PMID: 31115768 DOI: 10.1007/s10916-019-1264-y
    In medical systems for patient's authentication, keeping biometric data secure is a general problem. Many studies have presented various ways of protecting biometric data especially finger vein biometric data. Thus, It is needs to find better ways of securing this data by applying the three principles of information security aforementioned, and creating a robust verification system with high levels of reliability, privacy and security. Moreover, it is very difficult to replace biometric information and any leakage of biometrics information leads to earnest risks for example replay attacks using the robbed biometric data. In this paper presented criticism and analysis to all attempts as revealed in the literature review and discussion the proposes a novel verification secure framework based confidentiality, integrity and availability (CIA) standard in triplex blockchain-particle swarm optimization (PSO)-advanced encryption standard (AES) techniques for medical systems patient's authentication. Three stages are performed on discussion. Firstly, proposes a new hybrid model pattern in order to increase the randomization based on radio frequency identification (RFID) and finger vein biometrics. To achieve this, proposed a new merge algorithm to combine the RFID features and finger vein features in one hybrid and random pattern. Secondly, how the propose verification secure framework are followed the CIA standard for telemedicine authentication by combination of AES encryption technique, blockchain and PSO in steganography technique based on proposed pattern model. Finally, discussed the validation and evaluation of the proposed verification secure framework.
  9. Mohsin AH, Zaidan AA, Zaidan BB, Mohammed KI, Albahri OS, Albahri AS, et al.
    Multimed Tools Appl, 2021;80(9):14137-14161.
    PMID: 33519293 DOI: 10.1007/s11042-020-10284-y
    Secure updating and sharing for large amounts of healthcare information (such as medical data on coronavirus disease 2019 [COVID-19]) in efficient and secure transmission are important but challenging in communication channels amongst hospitals. In particular, in addressing the above challenges, two issues are faced, namely, those related to confidentiality and integrity of their health data and to network failure that may cause concerns about data availability. To the authors' knowledge, no study provides secure updating and sharing solution for large amounts of healthcare information in communication channels amongst hospitals. Therefore, this study proposes and discusses a novel steganography-based blockchain method in the spatial domain as a solution. The novelty of the proposed method is the removal and addition of new particles in the particle swarm optimisation (PSO) algorithm. In addition, hash function can hide secret medical COVID-19 data in hospital databases whilst providing confidentiality with high embedding capacity and high image quality. Moreover, stego images with hash data and blockchain technology are used in updating and sharing medical COVID-19 data between hospitals in the network to improve the level of confidentiality and protect the integrity of medical COVID-19 data in grey-scale images, achieve data availability if any connection failure occurs in a single point of the network and eliminate the central point (third party) in the network during transmission. The proposed method is discussed in three stages. Firstly, the pre-hiding stage estimates the embedding capacity of each host image. Secondly, the secret COVID-19 data hiding stage uses PSO algorithm and hash function. Thirdly, the transmission stage transfers the stego images based on blockchain technology and updates all nodes (hospitals) in the network. As proof of concept for the case study, the authors adopted the latest COVID-19 research published in the Computer Methods and Programs in Biomedicine journal, which presents a rescue framework within hospitals for the storage and transfusion of the best convalescent plasma to the most critical patients with COVID-19 on the basis of biological requirements. The validation and evaluation of the proposed method are discussed.
  10. Mohammed TJ, Albahri AS, Zaidan AA, Albahri OS, Al-Obaidi JR, Zaidan BB, et al.
    Appl Intell (Dordr), 2021;51(5):2956-2987.
    PMID: 34764579 DOI: 10.1007/s10489-020-02169-2
    As coronavirus disease 2019 (COVID-19) spreads across the world, the transfusion of efficient convalescent plasma (CP) to the most critical patients can be the primary approach to preventing the virus spread and treating the disease, and this strategy is considered as an intelligent computing concern. In providing an automated intelligent computing solution to select the appropriate CP for the most critical patients with COVID-19, two challenges aspects are bound to be faced: (1) distributed hospital management aspects (including scalability and management issues for prioritising COVID-19 patients and donors simultaneously), and (2) technical aspects (including the lack of COVID-19 dataset availability of patients and donors and an accurate matching process amongst them considering all blood types). Based on previous reports, no study has provided a solution for CP-transfusion-rescue intelligent framework during this pandemic that has addressed said challenges and issues. This study aimed to propose a novel CP-transfusion intelligent framework for rescuing COVID-19 patients across centralised/decentralised telemedicine hospitals based on the matching component process to provide an efficient CP from eligible donors to the most critical patients using multicriteria decision-making (MCDM) methods. A dataset, including COVID-19 patients/donors that have met the important criteria in the virology field, must be augmented to improve the developed framework. Four consecutive phases conclude the methodology. In the first phase, a new COVID-19 dataset is generated on the basis of medical-reference ranges by specialised experts in the virology field. The simulation data are classified into 80 patients and 80 donors on the basis of the five biomarker criteria with four blood types (i.e., A, B, AB, and O) and produced for COVID-19 case study. In the second phase, the identification scenario of patient/donor distributions across four centralised/decentralised telemedicine hospitals is identified 'as a proof of concept'. In the third phase, three stages are conducted to develop a CP-transfusion-rescue framework. In the first stage, two decision matrices are adopted and developed on the basis of the five 'serological/protein biomarker' criteria for the prioritisation of patient/donor lists. In the second stage, MCDM techniques are analysed to adopt individual and group decision making based on integrated AHP-TOPSIS as suitable methods. In the third stage, the intelligent matching components amongst patients/donors are developed on the basis of four distinct rules. In the final phase, the guideline of the objective validation steps is reported. The intelligent framework implies the benefits and strength weights of biomarker criteria to the priority configuration results and can obtain efficient CPs for the most critical patients. The execution of matching components possesses the scalability and balancing presentation within centralised/decentralised hospitals. The objective validation results indicate that the ranking is valid.
  11. Mohammed KI, Zaidan AA, Zaidan BB, Albahri OS, Albahri AS, Alsalem MA, et al.
    Comput Methods Programs Biomed, 2020 Mar;185:105151.
    PMID: 31710981 DOI: 10.1016/j.cmpb.2019.105151
    CONTEXT: Telemedicine has been increasingly used in healthcare to provide services to patients remotely. However, prioritising patients with multiple chronic diseases (MCDs) in telemedicine environment is challenging because it includes decision-making (DM) with regard to the emergency degree of each chronic disease for every patient.

    OBJECTIVE: This paper proposes a novel technique for reorganisation of opinion order to interval levels (TROOIL) to prioritise the patients with MCDs in real-time remote health-monitoring system.

    METHODS: The proposed TROOIL technique comprises six steps for prioritisation of patients with MCDs: (1) conversion of actual data into intervals; (2) rule generation; (3) rule ordering; (4) expert rule validation; (5) data reorganisation; and (6) criteria weighting and ranking alternatives within each rule. The secondary dataset of 500 patients from the most relevant study in a remote prioritisation area was adopted. The dataset contains three diseases, namely, chronic heart disease, high blood pressure (BP) and low BP.

    RESULTS: The proposed TROOIL is an effective technique for prioritising patients with MCDs. In the objective validation, remarkable differences were recognised among the groups' scores, indicating identical ranking results. In the evaluation of issues within all scenarios, the proposed framework has an advantage of 22.95% over the benchmark framework.

    DISCUSSION: Patients with the most severe MCD were treated first on the basis of their highest priority levels. The treatment for patients with less severe cases was delayed more than that for other patients.

    CONCLUSIONS: The proposed TROOIL technique can deal with multiple DM problems in prioritisation of patients with MCDs.

  12. Mohammed KI, Zaidan AA, Zaidan BB, Albahri OS, Alsalem MA, Albahri AS, et al.
    J Med Syst, 2019 Jun 11;43(7):223.
    PMID: 31187288 DOI: 10.1007/s10916-019-1362-x
    Remotely monitoring a patient's condition is a serious issue and must be addressed. Remote health monitoring systems (RHMS) in telemedicine refers to resources, strategies, methods and installations that enable doctors or other medical professionals to work remotely to consult, diagnose and treat patients. The goal of RHMS is to provide timely medical services at remote areas through telecommunication technologies. Through major advancements in technology, particularly in wireless networking, cloud computing and data storage, RHMS is becoming a feasible aspect of modern medicine. RHMS for the prioritisation of patients with multiple chronic diseases (MCDs) plays an important role in sustainably providing high-quality healthcare services. Further investigations are required to highlight the limitations of the prioritisation of patients with MCDs over a telemedicine environment. This study introduces a comprehensive and inclusive review on the prioritisation of patients with MCDs in telemedicine applications. Furthermore, it presents the challenges and open issues regarding patient prioritisation in telemedicine. The findings of this study are as follows: (1) The limitations and problems of existing patients' prioritisation with MCDs are presented and emphasised. (2) Based on the analysis of the academic literature, an accurate solution for remote prioritisation in a large scale of patients with MCDs was not presented. (3) There is an essential need to produce a new multiple-criteria decision-making theory to address the current problems in the prioritisation of patients with MCDs.
  13. Mat Kiah ML, Al-Bakri SH, Zaidan AA, Zaidan BB, Hussain M
    J Med Syst, 2014 Oct;38(10):133.
    PMID: 25199651 DOI: 10.1007/s10916-014-0133-y
    One of the applications of modern technology in telemedicine is video conferencing. An alternative to traveling to attend a conference or meeting, video conferencing is becoming increasingly popular among hospitals. By using this technology, doctors can help patients who are unable to physically visit hospitals. Video conferencing particularly benefits patients from rural areas, where good doctors are not always available. Telemedicine has proven to be a blessing to patients who have no access to the best treatment. A telemedicine system consists of customized hardware and software at two locations, namely, at the patient's and the doctor's end. In such cases, the video streams of the conferencing parties may contain highly sensitive information. Thus, real-time data security is one of the most important requirements when designing video conferencing systems. This study proposes a secure framework for video conferencing systems and a complete management solution for secure video conferencing groups. Java Media Framework Application Programming Interface classes are used to design and test the proposed secure framework. Real-time Transport Protocol over User Datagram Protocol is used to transmit the encrypted audio and video streams, and RSA and AES algorithms are used to provide the required security services. Results show that the encryption algorithm insignificantly increases the video conferencing computation time.
  14. Kiah ML, Haiqi A, Zaidan BB, Zaidan AA
    Comput Methods Programs Biomed, 2014 Nov;117(2):360-82.
    PMID: 25070757 DOI: 10.1016/j.cmpb.2014.07.002
    The use of open source software in health informatics is increasingly advocated by authors in the literature. Although there is no clear evidence of the superiority of the current open source applications in the healthcare field, the number of available open source applications online is growing and they are gaining greater prominence. This repertoire of open source options is of a great value for any future-planner interested in adopting an electronic medical/health record system, whether selecting an existent application or building a new one. The following questions arise. How do the available open source options compare to each other with respect to functionality, usability and security? Can an implementer of an open source application find sufficient support both as a user and as a developer, and to what extent? Does the available literature provide adequate answers to such questions? This review attempts to shed some light on these aspects.
  15. Kiah ML, Zaidan BB, Zaidan AA, Nabi M, Ibraheem R
    J Med Syst, 2014 Apr;38(4):37.
    PMID: 24700079 DOI: 10.1007/s10916-014-0037-x
    The advancement of information technology has facilitated the automation and feasibility of online information sharing. The second generation of the World Wide Web (Web 2.0) enables the collaboration and sharing of online information through Web-serving applications. Data mashup, which is considered a Web 2.0 platform, plays an important role in information and communication technology applications. However, few ideas have been transformed into education and research domains, particularly in medical informatics. The creation of a friendly environment for medical informatics research requires the removal of certain obstacles in terms of search time, resource credibility, and search result accuracy. This paper considers three glitches that researchers encounter in medical informatics research; these glitches include the quality of papers obtained from scientific search engines (particularly, Web of Science and Science Direct), the quality of articles from the indices of these search engines, and the customizability and flexibility of these search engines. A customizable search engine for trusted resources of medical informatics was developed and implemented through data mashup. Results show that the proposed search engine improves the usability of scientific search engines for medical informatics. Pipe search engine was found to be more efficient than other engines.
  16. Kiah ML, Nabi MS, Zaidan BB, Zaidan AA
    J Med Syst, 2013 Oct;37(5):9971.
    PMID: 24037086 DOI: 10.1007/s10916-013-9971-2
    This study aims to provide security solutions for implementing electronic medical records (EMRs). E-Health organizations could utilize the proposed method and implement recommended solutions in medical/health systems. Majority of the required security features of EMRs were noted. The methods used were tested against each of these security features. In implementing the system, the combination that satisfied all of the security features of EMRs was selected. Secure implementation and management of EMRs facilitate the safeguarding of the confidentiality, integrity, and availability of e-health organization systems. Health practitioners, patients, and visitors can use the information system facilities safely and with confidence anytime and anywhere. After critically reviewing security and data transmission methods, a new hybrid method was proposed to be implemented on EMR systems. This method will enhance the robustness, security, and integration of EMR systems. The hybrid of simple object access protocol/extensible markup language (XML) with advanced encryption standard and secure hash algorithm version 1 has achieved the security requirements of an EMR system with the capability of integrating with other systems through the design of XML messages.
  17. Kalid N, Zaidan AA, Zaidan BB, Salman OH, Hashim M, Albahri OS, et al.
    J Med Syst, 2018 Mar 02;42(4):69.
    PMID: 29500683 DOI: 10.1007/s10916-018-0916-7
    This paper presents a new approach to prioritize "Large-scale Data" of patients with chronic heart diseases by using body sensors and communication technology during disasters and peak seasons. An evaluation matrix is used for emergency evaluation and large-scale data scoring of patients with chronic heart diseases in telemedicine environment. However, one major problem in the emergency evaluation of these patients is establishing a reasonable threshold for patients with the most and least critical conditions. This threshold can be used to detect the highest and lowest priority levels when all the scores of patients are identical during disasters and peak seasons. A practical study was performed on 500 patients with chronic heart diseases and different symptoms, and their emergency levels were evaluated based on four main measurements: electrocardiogram, oxygen saturation sensor, blood pressure monitoring, and non-sensory measurement tool, namely, text frame. Data alignment was conducted for the raw data and decision-making matrix by converting each extracted feature into an integer. This integer represents their state in the triage level based on medical guidelines to determine the features from different sources in a platform. The patients were then scored based on a decision matrix by using multi-criteria decision-making techniques, namely, integrated multi-layer for analytic hierarchy process (MLAHP) and technique for order performance by similarity to ideal solution (TOPSIS). For subjective validation, cardiologists were consulted to confirm the ranking results. For objective validation, mean ± standard deviation was computed to check the accuracy of the systematic ranking. This study provides scenarios and checklist benchmarking to evaluate the proposed and existing prioritization methods. Experimental results revealed the following. (1) The integration of TOPSIS and MLAHP effectively and systematically solved the patient settings on triage and prioritization problems. (2) In subjective validation, the first five patients assigned to the doctors were the most urgent cases that required the highest priority, whereas the last five patients were the least urgent cases and were given the lowest priority. In objective validation, scores significantly differed between the groups, indicating that the ranking results were identical. (3) For the first, second, and third scenarios, the proposed method exhibited an advantage over the benchmark method with percentages of 40%, 60%, and 100%, respectively. In conclusion, patients with the most and least urgent cases received the highest and lowest priority levels, respectively.
  18. Kalid N, Zaidan AA, Zaidan BB, Salman OH, Hashim M, Muzammil H
    J Med Syst, 2017 Dec 29;42(2):30.
    PMID: 29288419 DOI: 10.1007/s10916-017-0883-4
    The growing worldwide population has increased the need for technologies, computerised software algorithms and smart devices that can monitor and assist patients anytime and anywhere and thus enable them to lead independent lives. The real-time remote monitoring of patients is an important issue in telemedicine. In the provision of healthcare services, patient prioritisation poses a significant challenge because of the complex decision-making process it involves when patients are considered 'big data'. To our knowledge, no study has highlighted the link between 'big data' characteristics and real-time remote healthcare monitoring in the patient prioritisation process, as well as the inherent challenges involved. Thus, we present comprehensive insights into the elements of big data characteristics according to the six 'Vs': volume, velocity, variety, veracity, value and variability. Each of these elements is presented and connected to a related part in the study of the connection between patient prioritisation and real-time remote healthcare monitoring systems. Then, we determine the weak points and recommend solutions as potential future work. This study makes the following contributions. (1) The link between big data characteristics and real-time remote healthcare monitoring in the patient prioritisation process is described. (2) The open issues and challenges for big data used in the patient prioritisation process are emphasised. (3) As a recommended solution, decision making using multiple criteria, such as vital signs and chief complaints, is utilised to prioritise the big data of patients with chronic diseases on the basis of the most urgent cases.
  19. Hussien HM, Yasin SM, Udzir SNI, Zaidan AA, Zaidan BB
    J Med Syst, 2019 Sep 14;43(10):320.
    PMID: 31522262 DOI: 10.1007/s10916-019-1445-8
    Blockchain in healthcare applications requires robust security and privacy mechanism for high-level authentication, interoperability and medical records sharing to comply with the strict legal requirements of the Health Insurance Portability and Accountability Act of 1996. Blockchain technology in the healthcare industry has received considerable research attention in recent years. This study conducts a review to substantially analyse and map the research landscape of current technologies, mainly the use of blockchain in healthcare applications, into a coherent taxonomy. The present study systematically searches all relevant research articles on blockchain in healthcare applications in three accessible databases, namely, ScienceDirect, IEEE and Web of Science, by using the defined keywords 'blockchain', 'healthcare' and 'electronic health records' and their variations. The final set of collected articles related to the use of blockchain in healthcare application is divided into three categories. The first category includes articles (i.e. 43/58 scientific articles) that attempted to develop and design healthcare applications integrating blockchain, particularly those on new architecture, system designs, framework, scheme, model, platform, approach, protocol and algorithm. The second category includes studies (i.e., 6/58 scientific articles) that attempted to evaluate and analyse the adoption of blockchain in the healthcare system. Finally, the third category comprises review and survey articles (i.e., 6/58 scientific articles) related to the integration of blockchain into healthcare applications. The final articles for review are discussed on the basis of five aspects: (1) year of publication, (2) nationality of authors, (3) publishing house or journal, (4) purpose of using blockchain in health applications and the corresponding contributions and (5) problem types and proposed solutions. Additionally, this study provides identified motivations, open challenges and recommendations on the use of blockchain in healthcare applications. The current research contributes to the literature by providing a detailed review of feasible alternatives and identifying the research gaps. Accordingly, researchers and developers are provided with appealing opportunities to further develop decentralised healthcare applications through a comprehensive discussion of about the importance of blockchain and its integration into various healthcare applications.
Filters
Contact Us

Please provide feedback to Administrator (afdal@afpm.org.my)

External Links