Displaying publications 1 - 20 of 92 in total

Abstract:
Sort:
  1. Albahri AS, Hamid RA, Alwan JK, Al-Qays ZT, Zaidan AA, Zaidan BB, et al.
    J Med Syst, 2020 May 25;44(7):122.
    PMID: 32451808 DOI: 10.1007/s10916-020-01582-x
    Coronaviruses (CoVs) are a large family of viruses that are common in many animal species, including camels, cattle, cats and bats. Animal CoVs, such as Middle East respiratory syndrome-CoV, severe acute respiratory syndrome (SARS)-CoV, and the new virus named SARS-CoV-2, rarely infect and spread among humans. On January 30, 2020, the International Health Regulations Emergency Committee of the World Health Organisation declared the outbreak of the resulting disease from this new CoV called 'COVID-19', as a 'public health emergency of international concern'. This global pandemic has affected almost the whole planet and caused the death of more than 315,131 patients as of the date of this article. In this context, publishers, journals and researchers are urged to research different domains and stop the spread of this deadly virus. The increasing interest in developing artificial intelligence (AI) applications has addressed several medical problems. However, such applications remain insufficient given the high potential threat posed by this virus to global public health. This systematic review addresses automated AI applications based on data mining and machine learning (ML) algorithms for detecting and diagnosing COVID-19. We aimed to obtain an overview of this critical virus, address the limitations of utilising data mining and ML algorithms, and provide the health sector with the benefits of this technique. We used five databases, namely, IEEE Xplore, Web of Science, PubMed, ScienceDirect and Scopus and performed three sequences of search queries between 2010 and 2020. Accurate exclusion criteria and selection strategy were applied to screen the obtained 1305 articles. Only eight articles were fully evaluated and included in this review, and this number only emphasised the insufficiency of research in this important area. After analysing all included studies, the results were distributed following the year of publication and the commonly used data mining and ML algorithms. The results found in all papers were discussed to find the gaps in all reviewed papers. Characteristics, such as motivations, challenges, limitations, recommendations, case studies, and features and classes used, were analysed in detail. This study reviewed the state-of-the-art techniques for CoV prediction algorithms based on data mining and ML assessment. The reliability and acceptability of extracted information and datasets from implemented technologies in the literature were considered. Findings showed that researchers must proceed with insights they gain, focus on identifying solutions for CoV problems, and introduce new improvements. The growing emphasis on data mining and ML techniques in medical fields can provide the right environment for change and improvement.
  2. Fauzi MFA, Chen W, Knight D, Hampel H, Frankel WL, Gurcan MN
    J Med Syst, 2019 Dec 18;44(2):38.
    PMID: 31853654 DOI: 10.1007/s10916-019-1515-y
    Tumor budding is defined as the presence of single tumor cells or small tumor clusters (less than five cells) that 'bud' from the invasive front of the main tumor. Tumor budding (TB) has recently emerged as an important adverse prognostic factor for many different cancer types. In colorectal carcinoma (CRC), tumor budding has been independently associated with lymph node metastasis and poor outcome. Pathologic assessment of tumor budding by light microscopy requires close evaluation of tumor invasive front on intermediate to high power magnification, entailing locating the 'hotspot' of tumor budding, counting all TB in one high power field, and generating a tumor budding score. By automating these time-consuming tasks, computer-assisted image analysis tools can be helpful for daily pathology practice, since tumor budding reporting is now recommended on select cases. In this paper, we report our work on the development of a tumor budding detection system in CRC from whole-slide Cytokeratin AE1/3 images, based on de novo computer algorithm that automates morphometric analysis of tumor budding.
  3. Hussien HM, Yasin SM, Udzir SNI, Zaidan AA, Zaidan BB
    J Med Syst, 2019 Sep 14;43(10):320.
    PMID: 31522262 DOI: 10.1007/s10916-019-1445-8
    Blockchain in healthcare applications requires robust security and privacy mechanism for high-level authentication, interoperability and medical records sharing to comply with the strict legal requirements of the Health Insurance Portability and Accountability Act of 1996. Blockchain technology in the healthcare industry has received considerable research attention in recent years. This study conducts a review to substantially analyse and map the research landscape of current technologies, mainly the use of blockchain in healthcare applications, into a coherent taxonomy. The present study systematically searches all relevant research articles on blockchain in healthcare applications in three accessible databases, namely, ScienceDirect, IEEE and Web of Science, by using the defined keywords 'blockchain', 'healthcare' and 'electronic health records' and their variations. The final set of collected articles related to the use of blockchain in healthcare application is divided into three categories. The first category includes articles (i.e. 43/58 scientific articles) that attempted to develop and design healthcare applications integrating blockchain, particularly those on new architecture, system designs, framework, scheme, model, platform, approach, protocol and algorithm. The second category includes studies (i.e., 6/58 scientific articles) that attempted to evaluate and analyse the adoption of blockchain in the healthcare system. Finally, the third category comprises review and survey articles (i.e., 6/58 scientific articles) related to the integration of blockchain into healthcare applications. The final articles for review are discussed on the basis of five aspects: (1) year of publication, (2) nationality of authors, (3) publishing house or journal, (4) purpose of using blockchain in health applications and the corresponding contributions and (5) problem types and proposed solutions. Additionally, this study provides identified motivations, open challenges and recommendations on the use of blockchain in healthcare applications. The current research contributes to the literature by providing a detailed review of feasible alternatives and identifying the research gaps. Accordingly, researchers and developers are provided with appealing opportunities to further develop decentralised healthcare applications through a comprehensive discussion of about the importance of blockchain and its integration into various healthcare applications.
  4. Acharya UR, Fernandes SL, WeiKoh JE, Ciaccio EJ, Fabell MKM, Tanik UJ, et al.
    J Med Syst, 2019 Aug 09;43(9):302.
    PMID: 31396722 DOI: 10.1007/s10916-019-1428-9
    The aim of this work is to develop a Computer-Aided-Brain-Diagnosis (CABD) system that can determine if a brain scan shows signs of Alzheimer's disease. The method utilizes Magnetic Resonance Imaging (MRI) for classification with several feature extraction techniques. MRI is a non-invasive procedure, widely adopted in hospitals to examine cognitive abnormalities. Images are acquired using the T2 imaging sequence. The paradigm consists of a series of quantitative techniques: filtering, feature extraction, Student's t-test based feature selection, and k-Nearest Neighbor (KNN) based classification. Additionally, a comparative analysis is done by implementing other feature extraction procedures that are described in the literature. Our findings suggest that the Shearlet Transform (ST) feature extraction technique offers improved results for Alzheimer's diagnosis as compared to alternative methods. The proposed CABD tool with the ST + KNN technique provided accuracy of 94.54%, precision of 88.33%, sensitivity of 96.30% and specificity of 93.64%. Furthermore, this tool also offered an accuracy, precision, sensitivity and specificity of 98.48%, 100%, 96.97% and 100%, respectively, with the benchmark MRI database.
  5. Raghavendra U, Gudigar A, Bhandary SV, Rao TN, Ciaccio EJ, Acharya UR
    J Med Syst, 2019 Jul 30;43(9):299.
    PMID: 31359230 DOI: 10.1007/s10916-019-1427-x
    Glaucoma is a type of eye condition which may result in partial or consummate vision loss. Higher intraocular pressure is the leading cause for this condition. Screening for glaucoma and early detection can avert vision loss. Computer aided diagnosis (CAD) is an automated process with the potential to identify glaucoma early through quantitative analysis of digital fundus images. Preparing an effective model for CAD requires a large database. This study presents a CAD tool for the precise detection of glaucoma using a machine learning approach. An autoencoder is trained to determine effective and important features from fundus images. These features are used to develop classes of glaucoma for testing. The method achieved an F - measure value of 0.95 utilizing 1426 digital fundus images (589 control and 837 glaucoma). The efficacy of the system is evident, and is suggestive of its possible utility as an additional tool for verification of clinical decisions.
  6. Mohammed KI, Zaidan AA, Zaidan BB, Albahri OS, Alsalem MA, Albahri AS, et al.
    J Med Syst, 2019 Jun 11;43(7):223.
    PMID: 31187288 DOI: 10.1007/s10916-019-1362-x
    Remotely monitoring a patient's condition is a serious issue and must be addressed. Remote health monitoring systems (RHMS) in telemedicine refers to resources, strategies, methods and installations that enable doctors or other medical professionals to work remotely to consult, diagnose and treat patients. The goal of RHMS is to provide timely medical services at remote areas through telecommunication technologies. Through major advancements in technology, particularly in wireless networking, cloud computing and data storage, RHMS is becoming a feasible aspect of modern medicine. RHMS for the prioritisation of patients with multiple chronic diseases (MCDs) plays an important role in sustainably providing high-quality healthcare services. Further investigations are required to highlight the limitations of the prioritisation of patients with MCDs over a telemedicine environment. This study introduces a comprehensive and inclusive review on the prioritisation of patients with MCDs in telemedicine applications. Furthermore, it presents the challenges and open issues regarding patient prioritisation in telemedicine. The findings of this study are as follows: (1) The limitations and problems of existing patients' prioritisation with MCDs are presented and emphasised. (2) Based on the analysis of the academic literature, an accurate solution for remote prioritisation in a large scale of patients with MCDs was not presented. (3) There is an essential need to produce a new multiple-criteria decision-making theory to address the current problems in the prioritisation of patients with MCDs.
  7. Abdar M, Wijayaningrum VN, Hussain S, Alizadehsani R, Plawiak P, Acharya UR, et al.
    J Med Syst, 2019 Jun 07;43(7):220.
    PMID: 31175462 DOI: 10.1007/s10916-019-1343-0
    Wart disease (WD) is a skin illness on the human body which is caused by the human papillomavirus (HPV). This study mainly concentrates on common and plantar warts. There are various treatment methods for this disease, including the popular immunotherapy and cryotherapy methods. Manual evaluation of the WD treatment response is challenging. Furthermore, traditional machine learning methods are not robust enough in WD classification as they cannot deal effectively with small number of attributes. This study proposes a new evolutionary-based computer-aided diagnosis (CAD) system using machine learning to classify the WD treatment response. The main architecture of our CAD system is based on the combination of improved adaptive particle swarm optimization (IAPSO) algorithm and artificial immune recognition system (AIRS). The cross-validation protocol was applied to test our machine learning-based classification system, including five different partition protocols (K2, K3, K4, K5 and K10). Our database consisted of 180 records taken from immunotherapy and cryotherapy databases. The best results were obtained using the K10 protocol that provided the precision, recall, F-measure and accuracy values of 0.8908, 0.8943, 0.8916 and 90%, respectively. Our IAPSO system showed the reliability of 98.68%. It was implemented in Java, while integrated development environment (IDE) was implemented using NetBeans. Our encouraging results suggest that the proposed IAPSO-AIRS system can be employed for the WD management in clinical environment.
  8. Almahdi EM, Zaidan AA, Zaidan BB, Alsalem MA, Albahri OS, Albahri AS
    J Med Syst, 2019 Jun 06;43(7):219.
    PMID: 31172296 DOI: 10.1007/s10916-019-1339-9
    This study presents a prioritisation framework for mobile patient monitoring systems (MPMSs) based on multicriteria analysis in architectural components. This framework selects the most appropriate system amongst available MPMSs for the telemedicine environment. Prioritisation of MPMSs is a challenging task due to (a) multiple evaluation criteria, (b) importance of criteria, (c) data variation and (d) unmeasurable values. The secondary data presented as the decision evaluation matrix include six systems (namely, Yale-National Aeronautics and Space Administration (NASA), advanced health and disaster aid network, personalised health monitoring, CMS, MobiHealth and NTU) as alternatives and 13 criteria (namely, supported number of sensors, sensor front-end (SFE) communication, SFE to mobile base unit (MBU) communications, display of biosignals on the MBU, storage of biosignals on the MBU, intra-body area network (BAN) communication problems, extra-BAN communication problems, extra-BAN communication technology, extra-BAN communication protocols, back-end system communication technology, intended geographic area of use, end-to-end security and reported trial problems) based on the architectural components of MPMSs. These criteria are adopted from the most relevant studies and are found to be applicable to this study. The prioritisation framework is developed in three stages. (1) The unmeasurable values of the MPMS evaluation criteria in the adopted decision evaluation matrix based on expert opinion are represented by using the best-worst method (BWM). (2) The importance of the evaluation criteria based on the architectural components of the MPMS is determined by using the BWM. (3) The VlseKriterijumska Optimizacija I Kompromisno Resenje (VIKOR) method is utilised to rank the MPMSs according to the determined importance of the evaluation criteria and the adopted decision matrix. For validation, mean ± standard deviation is used to verify the similarity of systematic prioritisations objectively. The following results are obtained. (1) The BWM represents the unmeasurable values of the MPMS evaluation criteria. (2) The BWM is suitable for weighing the evaluation criteria based on the architectural components of the MPMS. (3) VIKOR is suitable for solving the MPMS prioritisation problem. Moreover, the internal and external VIKOR group decision making are approximately the same, with the best MPMS being 'Yale-NASA' and the worst MPMS being 'NTU'. (4) For the objective validation, remarkable differences are observed between the group scores, which indicate the similarity of internal and external prioritisation results.
  9. Alsalem MA, Zaidan AA, Zaidan BB, Albahri OS, Alamoodi AH, Albahri AS, et al.
    J Med Syst, 2019 Jun 01;43(7):212.
    PMID: 31154550 DOI: 10.1007/s10916-019-1338-x
    This paper aims to assist the administration departments of medical organisations in making the right decision on selecting a suitable multiclass classification model for acute leukaemia. In this paper, we proposed a framework that will aid these departments in evaluating, benchmarking and ranking available multiclass classification models for the selection of the best one. Medical organisations have continuously faced evaluation and benchmarking challenges in such endeavour, especially when no single model is superior. Moreover, the improper selection of multiclass classification for acute leukaemia model may be costly for medical organisations. For example, when a patient dies, one such organisation will be legally or financially sued for incidents in which the model fails to fulfil its desired outcome. With regard to evaluation and benchmarking, multiclass classification models are challenging processes due to multiple evaluation and conflicting criteria. This study structured a decision matrix (DM) based on the crossover of 2 groups of multi-evaluation criteria and 22 multiclass classification models. The matrix was then evaluated with datasets comprising 72 samples of acute leukaemia, which include 5327 gens. Subsequently, multi-criteria decision-making (MCDM) techniques are used in the benchmarking and ranking of multiclass classification models. The MCDM used techniques that include the integrated BWM and VIKOR. BWM has been applied for the weight calculations of evaluation criteria, whereas VIKOR has been used to benchmark and rank classification models. VIKOR has also been employed in two decision-making contexts: individual and group decision making and internal and external group aggregation. Results showed the following: (1) the integration of BWM and VIKOR is effective at solving the benchmarking/selection problems of multiclass classification models. (2) The ranks of classification models obtained from internal and external VIKOR group decision making were almost the same, and the best multiclass classification model based on the two was 'Bayes. Naive Byes Updateable' and the worst one was 'Trees.LMT'. (3) Among the scores of groups in the objective validation, significant differences were identified, which indicated that the ranking results of internal and external VIKOR group decision making were valid.
  10. Almahdi EM, Zaidan AA, Zaidan BB, Alsalem MA, Albahri OS, Albahri AS
    J Med Syst, 2019 May 29;43(7):207.
    PMID: 31144129 DOI: 10.1007/s10916-019-1336-z
    This paper presents comprehensive insights into mobile patient monitoring systems (MPMSs) from evaluation and benchmarking aspects on the basis of two critical directions. The current evaluation criteria of MPMSs based on the architectural components of MPMSs and possible solutions are discussed. This review highlights four serious issues, namely, multiple evaluation criteria, criterion importance, unmeasurable criteria and data variation, in MPMS benchmarking. Multicriteria decision-making (MCDM) analysis techniques are proposed as effective solutions to solve these issues from a methodological aspect. This methodological aspect involves a framework for benchmarking MPMSs on the basis of MCDM to rank available MPMSs and select a suitable one. The benchmarking framework is discussed in four steps. Firstly, pre-processing and identification procedures are presented. Secondly, the procedure of weight calculation based on the best-worst method (BWM) is described. Thirdly, the development of a benchmark framework by using the VIKOR method is introduced. Lastly, the proposed framework is validated.
  11. Ay B, Yildirim O, Talo M, Baloglu UB, Aydin G, Puthankattil SD, et al.
    J Med Syst, 2019 May 28;43(7):205.
    PMID: 31139932 DOI: 10.1007/s10916-019-1345-y
    Depression affects large number of people across the world today and it is considered as the global problem. It is a mood disorder which can be detected using electroencephalogram (EEG) signals. The manual detection of depression by analyzing the EEG signals requires lot of experience, tedious and time consuming. Hence, a fully automated depression diagnosis system developed using EEG signals will help the clinicians. Therefore, we propose a deep hybrid model developed using convolutional neural network (CNN) and long-short term memory (LSTM) architectures to detect depression using EEG signals. In the deep model, temporal properties of the signals are learned with CNN layers and the sequence learning process is provided through the LSTM layers. In this work, we have used EEG signals obtained from left and right hemispheres of the brain. Our work has provided 99.12% and 97.66% classification accuracies for the right and left hemisphere EEG signals respectively. Hence, we can conclude that the developed CNN-LSTM model is accurate and fast in detecting the depression using EEG signals. It can be employed in psychiatry wards of the hospitals to detect the depression using EEG signals accurately and thus aid the psychiatrists.
  12. Mohsin AH, Zaidan AA, Zaidan BB, Albahri OS, Albahri AS, Alsalem MA, et al.
    J Med Syst, 2019 May 22;43(7):192.
    PMID: 31115768 DOI: 10.1007/s10916-019-1264-y
    In medical systems for patient's authentication, keeping biometric data secure is a general problem. Many studies have presented various ways of protecting biometric data especially finger vein biometric data. Thus, It is needs to find better ways of securing this data by applying the three principles of information security aforementioned, and creating a robust verification system with high levels of reliability, privacy and security. Moreover, it is very difficult to replace biometric information and any leakage of biometrics information leads to earnest risks for example replay attacks using the robbed biometric data. In this paper presented criticism and analysis to all attempts as revealed in the literature review and discussion the proposes a novel verification secure framework based confidentiality, integrity and availability (CIA) standard in triplex blockchain-particle swarm optimization (PSO)-advanced encryption standard (AES) techniques for medical systems patient's authentication. Three stages are performed on discussion. Firstly, proposes a new hybrid model pattern in order to increase the randomization based on radio frequency identification (RFID) and finger vein biometrics. To achieve this, proposed a new merge algorithm to combine the RFID features and finger vein features in one hybrid and random pattern. Secondly, how the propose verification secure framework are followed the CIA standard for telemedicine authentication by combination of AES encryption technique, blockchain and PSO in steganography technique based on proposed pattern model. Finally, discussed the validation and evaluation of the proposed verification secure framework.
  13. Vicnesh J, Wei JKE, Ciaccio EJ, Oh SL, Bhagat G, Lewis SK, et al.
    J Med Syst, 2019 Apr 26;43(6):157.
    PMID: 31028562 DOI: 10.1007/s10916-019-1285-6
    Celiac disease is a genetically determined disorder of the small intestine, occurring due to an immune response to ingested gluten-containing food. The resulting damage to the small intestinal mucosa hampers nutrient absorption, and is characterized by diarrhea, abdominal pain, and a variety of extra-intestinal manifestations. Invasive and costly methods such as endoscopic biopsy are currently used to diagnose celiac disease. Detection of the disease by histopathologic analysis of biopsies can be challenging due to suboptimal sampling. Video capsule images were obtained from celiac patients and controls for comparison and classification. This study exploits the use of DAISY descriptors to project two-dimensional images onto one-dimensional vectors. Shannon entropy is then used to extract features, after which a particle swarm optimization algorithm coupled with normalization is employed to select the 30 best features for classification. Statistical measures of this paradigm were tabulated. The accuracy, positive predictive value, sensitivity and specificity obtained in distinguishing celiac versus control video capsule images were 89.82%, 89.17%, 94.35% and 83.20% respectively, using the 10-fold cross-validation technique. When employing manual methods rather than the automated means described in this study, technical limitations and inconclusive results may hamper diagnosis. Our findings suggest that the computer-aided detection system presented herein can render diagnostic information, and thus may provide clinicians with an important tool to validate a diagnosis of celiac disease.
  14. Ali HH, Lamsali H, Othman SN
    J Med Syst, 2019 Apr 10;43(5):139.
    PMID: 30972511 DOI: 10.1007/s10916-019-1263-z
    Hospital scheduling presents huge challenges for the healthcare industry. Various studies have been conducted in many different countries with focus on both elective and non-elective surgeries. There are important variables and factors that need to be taken into considerations. Different methods and approaches have also been used to examine hospital scheduling. Notwithstanding the continuous changes in modern healthcare services and, in particular, hospital operations, consistent reviews and further studies are still required. The importance of hospital scheduling, particularly, has become more critical as the trade-off between limited resources and overwhelming demand is becoming more evident. This situation is even more pressing in a volatile country where shootings and bombings in public areas happened. Hospital scheduling for elective surgeries in volatile country such as Iraq is therefore often interrupted by non-elective surgeries due to war-related incidents. Hence, this paper intends to address this issue by proposing a hospital scheduling model with focus on neuro-surgery department. The aim of the model is to maximize utilization of operating room while concurrently minimizing idle time of surgery. The study focused on neurosurgery department in Al-Shahid Ghazi Al-Hariri hospital in Baghdad, Iraq. In doing so, a Mixed-integer linear programming (MILP) model is formulated where interruptions of non-elective surgery are incorporated into the main elective surgery based model. Computational experiment is then carried out to test the model. The result indicates that the model is feasible and can be solved in reasonable times. Nonetheless, its feasibility is further tested as the problems size and the computation times is getting bigger and longer. Application of heuristic methods is the way forward to ensure better practicality of the proposed model. In the end, the potential benefit of this study and the proposed model is discussed.
  15. Talal M, Zaidan AA, Zaidan BB, Albahri AS, Alamoodi AH, Albahri OS, et al.
    J Med Syst, 2019 Jan 15;43(3):42.
    PMID: 30648217 DOI: 10.1007/s10916-019-1158-z
    The Internet of Things (IoT) has been identified in various applications across different domains, such as in the healthcare sector. IoT has also been recognised for its revolution in reshaping modern healthcare with aspiring wide range prospects, including economical, technological and social. This study aims to establish IoT-based smart home security solutions for real-time health monitoring technologies in telemedicine architecture. A multilayer taxonomy is driven and conducted in this study. In the first layer, a comprehensive analysis on telemedicine, which focuses on the client and server sides, shows that other studies associated with IoT-based smart home applications have several limitations that remain unaddressed. Particularly, remote patient monitoring in healthcare applications presents various facilities and benefits by adopting IoT-based smart home technologies without compromising the security requirements and potentially large number of risks. An extensive search is conducted to identify articles that handle these issues, related applications are comprehensively reviewed and a coherent taxonomy for these articles is established. A total number of (n = 3064) are gathered between 2007 and 2017 for most reliable databases, such as ScienceDirect, Web of Science and Institute of Electrical and Electronic Engineer Xplore databases. Then, the articles based on IoT studies that are associated with telemedicine applications are filtered. Nine articles are selected and classified into two categories. The first category, which accounts for 22.22% (n = 2/9), includes surveys on telemedicine articles and their applications. The second category, which accounts for 77.78% (n = 7/9), includes articles on the client and server sides of telemedicine architecture. The collected studies reveal the essential requirement in constructing another taxonomy layer and review IoT-based smart home security studies. Therefore, IoT-based smart home security features are introduced and analysed in the second layer. The security of smart home design based on IoT applications is an aspect that represents a crucial matter for general occupants of smart homes, in which studies are required to provide a better solution with patient security, privacy protection and security of users' entities from being stolen or compromised. Innovative technologies have dispersed limitations related to this matter. The existing gaps and trends in this area should be investigated to provide valuable visions for technical environments and researchers. Thus, 67 articles are obtained in the second layer of our taxonomy and are classified into six categories. In the first category, 25.37% (n = 17/67) of the articles focus on architecture design. In the second category, 17.91% (n = 12/67) includes security analysis articles that investigate the research status in the security area of IoT-based smart home applications. In the third category, 10.44% (n = 7/67) includes articles about security schemes. In the fourth category, 17.91% (n = 12/67) comprises security examination. In the fifth category, 13.43% (n = 9/67) analyses security protocols. In the final category, 14.92% (n = 10/67) analyses the security framework. Then, the identified basic characteristics of this emerging field are presented and provided in the following aspects. Open challenges experienced on the development of IoT-based smart home security are addressed to be adopted fully in telemedicine applications. Then, the requirements are provided to increase researcher's interest in this study area. On this basis, a number of recommendations for different parties are described to provide insights on the next steps that should be considered to enhance the security of smart homes based on IoT. A map matching for both taxonomies is developed in this study to determine the novel risks and benefits of IoT-based smart home security for real-time remote health monitoring within client and server sides in telemedicine applications.
  16. Shuwandy ML, Zaidan BB, Zaidan AA, Albahri AS
    J Med Syst, 2019 Jan 06;43(2):33.
    PMID: 30612191 DOI: 10.1007/s10916-018-1149-5
    The new and groundbreaking real-time remote healthcare monitoring system on sensor-based mobile health (mHealth) authentication in telemedicine has considerably bounded and dispersed communication components. mHealth, an attractive part in telemedicine architecture, plays an imperative role in patient security and privacy and adapts different sensing technologies through many built-in sensors. This study aims to improve sensor-based defence and attack mechanisms to ensure patient privacy in client side when using mHealth. Thus, a multilayer taxonomy was conducted to attain the goal of this study. Within the first layer, real-time remote monitoring studies based on sensor technology for telemedicine application were reviewed and analysed to examine these technologies and provide researchers with a clear vision of security- and privacy-based sensors in the telemedicine area. An extensive search was conducted to find articles about security and privacy issues, review related applications comprehensively and establish the coherent taxonomy of these articles. ScienceDirect, IEEE Xplore and Web of Science databases were investigated for articles on mHealth in telemedicine-based sensor. A total of 3064 papers were collected from 2007 to 2017. The retrieved articles were filtered according to the security and privacy of sensor-based telemedicine applications. A total of 19 articles were selected and classified into two categories. The first category, 57.89% (n = 11/19), included survey on telemedicine articles and their applications. The second category, 42.1% (n = 8/19), included articles contributed to the three-tiered architecture of telemedicine. The collected studies improved the essential need to add another taxonomy layer and review the sensor-based smartphone authentication studies. This map matching for both taxonomies was developed for this study to investigate sensor field comprehensively and gain access to novel risks and benefits of the mHealth security in telemedicine application. The literature on sensor-based smartphones in the second layer of our taxonomy was analysed and reviewed. A total of 599 papers were collected from 2007 to 2017. In this layer, we obtained a final set of 81 articles classified into three categories. The first category of the articles [86.41% (n = 70/81)], where sensor-based smartphones were examined by utilising orientation sensors for user authentication, was used. The second category [7.40% (n = 6/81)] included attack articles, which were not intensively included in our literature analysis. The third category [8.64% (n = 7/81)] included 'other' articles. Factors were considered to understand fully the various contextual aspects of the field in published studies. The characteristics included the motivation and challenges related to sensor-based authentication of smartphones encountered by researchers and the recommendations to strengthen this critical area of research. Finally, many studies on the sensor-based smartphone in the second layer have focused on enhancing accurate authentication because sensor-based smartphones require sensors that could authentically secure mHealth.
  17. Iqbal U, Wah TY, Habib Ur Rehman M, Mujtaba G, Imran M, Shoaib M
    J Med Syst, 2018 Nov 05;42(12):252.
    PMID: 30397730 DOI: 10.1007/s10916-018-1107-2
    Electrocardiography (ECG) sensors play a vital role in the Internet of Medical Things, and these sensors help in monitoring the electrical activity of the heart. ECG signal analysis can improve human life in many ways, from diagnosing diseases among cardiac patients to managing the lifestyles of diabetic patients. Abnormalities in heart activities lead to different cardiac diseases and arrhythmia. However, some cardiac diseases, such as myocardial infarction (MI) and atrial fibrillation (Af), require special attention due to their direct impact on human life. The classification of flattened T wave cases of MI in ECG signals and how much of these cases are similar to ST-T changes in MI remain an open issue for researchers. This article presents a novel contribution to classify MI and Af. To this end, we propose a new approach called deep deterministic learning (DDL), which works by combining predefined heart activities with fused datasets. In this research, we used two datasets. The first dataset, Massachusetts Institute of Technology-Beth Israel Hospital, is publicly available, and we exclusively obtained the second dataset from the University of Malaya Medical Center, Kuala Lumpur Malaysia. We first initiated predefined activities on each individual dataset to recognize patterns between the ST-T change and flattened T wave cases and then used the data fusion approach to merge both datasets in a manner that delivers the most accurate pattern recognition results. The proposed DDL approach is a systematic stage-wise methodology that relies on accurate detection of R peaks in ECG signals, time domain features of ECG signals, and fine tune-up of artificial neural networks. The empirical evaluation shows high accuracy (i.e., ≤99.97%) in pattern matching ST-T changes and flattened T waves using the proposed DDL approach. The proposed pattern recognition approach is a significant contribution to the diagnosis of special cases of MI.
  18. Mohsin AH, Zaidan AA, Zaidan BB, Ariffin SAB, Albahri OS, Albahri AS, et al.
    J Med Syst, 2018 Oct 29;42(12):245.
    PMID: 30374820 DOI: 10.1007/s10916-018-1103-6
    In real-time medical systems, the role of biometric technology is significant in authentication systems because it is used in verifying the identity of people through their biometric features. The biometric technology provides crucial properties for biometric features that can support the process of personal identification. The storage of biometric template within a central database makes it vulnerable to attack which can also occur during data transmission. Therefore, an alternative mechanism of protection becomes important to develop. On this basis, this study focuses on providing a detailed analysis of the extant literature (2013-2018) to identify the taxonomy and research distribution. Furthermore, this study also seeks to ascertain the challenges and motivations associated with biometric steganography in real-time medical systems to provide recommendations that can enhance the efficient use of real-time medical systems in biometric steganography and its applications. A review of articles on human biometric steganography in real-time medical systems obtained from three main databases (IEEE Xplore, ScienceDirect and Web of Science) is conducted according to an appropriate review protocol. Then, 41 related articles are selected by using exclusion and inclusion criteria. Majority of the studies reviewed had been conducted in the field of data-hiding (particularly steganography) technologies. In this review, various steganographic methods that have been applied in different human biometrics are investigated. Thereafter, these methods are categorised according to taxonomy, and the results are presented on the basis of human steganography biometric real-time medical systems, testing and evaluation methods, significance of use and applications and techniques. Finally, recommendations on how the challenges associated with data hiding can be addressed are provided to enhance the efficiency of using biometric information processed in any authentication real-time medical system. These recommendations are expected to be immensely helpful to developers, company users and researchers.
  19. Mohsin AH, Zaidan AA, Zaidan BB, Albahri AS, Albahri OS, Alsalem MA, et al.
    J Med Syst, 2018 Oct 16;42(12):238.
    PMID: 30327939 DOI: 10.1007/s10916-018-1104-5
    The development of wireless body area sensor networks is imperative for modern telemedicine. However, attackers and cybercriminals are gradually becoming aware in attacking telemedicine systems, and the black market value of protected health information has the highest price nowadays. Security remains a formidable challenge to be resolved. Intelligent home environments make up one of the major application areas of pervasive computing. Security and privacy are the two most important issues in the remote monitoring and control of intelligent home environments for clients and servers in telemedicine architecture. The personal authentication approach that uses the finger vein pattern is a newly investigated biometric technique. This type of biometric has many advantages over other types (explained in detail later on) and is suitable for different human categories and ages. This study aims to establish a secure verification method for real-time monitoring systems to be used for the authentication of patients and other members who are working in telemedicine systems. The process begins with the sensor based on Tiers 1 and 2 (client side) in the telemedicine architecture and ends with patient verification in Tier 3 (server side) via finger vein biometric technology to ensure patient security on both sides. Multilayer taxonomy is conducted in this research to attain the study's goal. In the first layer, real-time remote monitoring studies based on the sensor technology used in telemedicine applications are reviewed and analysed to provide researchers a clear vision of security and privacy based on sensors in telemedicine. An extensive search is conducted to identify articles that deal with security and privacy issues, related applications are reviewed comprehensively and a coherent taxonomy of these articles is established. ScienceDirect, IEEE Xplore and Web of Science databases are checked for articles on mHealth in telemedicine based on sensors. A total of 3064 papers are collected from 2007 to 2017. The retrieved articles are filtered according to the security and privacy of telemedicine applications based on sensors. Nineteen articles are selected and classified into two categories. The first category, which accounts for 57.89% (n = 11/19), includes surveys on telemedicine articles and their applications. The second category, accounting for 42.1% (n = 8/19), includes articles on the three-tiered architecture of telemedicine. The collected studies reveal the essential need to construct another taxonomy layer and review studies on finger vein biometric verification systems. This map-matching for both taxonomies is developed for this study to go deeply into the sensor field and determine novel risks and benefits for patient security and privacy on client and server sides in telemedicine applications. In the second layer of our taxonomy, the literature on finger vein biometric verification systems is analysed and reviewed. In this layer, we obtain a final set of 65 articles classified into four categories. In the first category, 80% (n = 52/65) of the articles focus on development and design. In the second category, 12.30% (n = 8/65) includes evaluation and comparative articles. These articles are not intensively included in our literature analysis. In the third category, 4.61% (n = 3/65) includes articles about analytical studies. In the fourth category, 3.07% (n = 2/65) comprises reviews and surveys. This study aims to provide researchers with an up-to-date overview of studies that have been conducted on (user/patient) authentication to enhance the security level in telemedicine or any information system. In the current study, taxonomy is presented by explaining previous studies. Moreover, this review highlights the motivations, challenges and recommendations related to finger vein biometric verification systems and determines the gaps in this research direction (protection of finger vein templates in real time), which represent a new research direction in this area.
Filters
Contact Us

Please provide feedback to Administrator (afdal@afpm.org.my)

External Links