Displaying publications 1 - 20 of 69 in total

Abstract:
Sort:
  1. Ho GJ, Liew SM, Ng CJ, Hisham Shunmugam R, Glasziou P
    PLoS One, 2016;11(12):e0167170.
    PMID: 27935993 DOI: 10.1371/journal.pone.0167170
    BACKGROUND: Physicians are often encouraged to locate answers for their clinical queries via an evidence-based literature search approach. The methods used are often not clearly specified. Inappropriate search strategies, time constraint and contradictory information complicate evidence retrieval.

    AIMS: Our study aimed to develop a search strategy to answer clinical queries among physicians in a primary care setting.

    METHODS: Six clinical questions of different medical conditions seen in primary care were formulated. A series of experimental searches to answer each question was conducted on 3 commonly advocated medical databases. We compared search results from a PICO (patients, intervention, comparison, outcome) framework for questions using different combinations of PICO elements. We also compared outcomes from doing searches using text words, Medical Subject Headings (MeSH), or a combination of both. All searches were documented using screenshots and saved search strategies.

    RESULTS: Answers to all 6 questions using the PICO framework were found. A higher number of systematic reviews were obtained using a 2 PICO element search compared to a 4 element search. A more optimal choice of search is a combination of both text words and MeSH terms. Despite searching using the Systematic Review filter, many non-systematic reviews or narrative reviews were found in PubMed. There was poor overlap between outcomes of searches using different databases. The duration of search and screening for the 6 questions ranged from 1 to 4 hours.

    CONCLUSION: This strategy has been shown to be feasible and can provide evidence to doctors' clinical questions. It has the potential to be incorporated into an interventional study to determine the impact of an online evidence retrieval system.

    Matched MeSH terms: Computer Systems
  2. Halmi MI, Jirangon H, Johari WL, Rachman AR, Shukor MY, Syed MA
    ScientificWorldJournal, 2014;2014:834202.
    PMID: 24977231 DOI: 10.1155/2014/834202
    Luminescence-based assays for toxicants such as Microtox, ToxAlert, and Biotox have been used extensively worldwide. However, the use of these assays in near real time conditions is limited due to nonoptimal assay temperature for the tropical climate. An isolate that exhibits a high luminescence activity in a broad range of temperatures was successfully isolated from the mackerel, Rastrelliger kanagurta. This isolate was tentatively identified as Photobacterium sp. strain MIE, based on partial 16S rDNA molecular phylogeny. Optimum conditions that support high bioluminescence activity occurred between 24 and 30°C, with pH 5.5 to 7.5, 10 to 20 g/L of sodium chloride, 30 to 50 g/L of tryptone, and 4 g/L of glycerol as the carbon source. Assessment of near real time capability of this bacterial system, Xenoassay light to monitor heavy metals from a contaminated river running through the Juru River Basin shows near real time capability with assaying time of less than 30 minutes per samples. Samples returned to the lab were tested with a standard Microtox assay using Vibrio fishceri. Similar results were obtained to Xenoassay light that show temporal variation of copper concentration. Thus, this strain is suitable for near real time river monitoring of toxicants especially in the tropics.
    Matched MeSH terms: Computer Systems
  3. Al-batah MS, Isa NA, Klaib MF, Al-Betar MA
    Comput Math Methods Med, 2014;2014:181245.
    PMID: 24707316 DOI: 10.1155/2014/181245
    To date, cancer of uterine cervix is still a leading cause of cancer-related deaths in women worldwide. The current methods (i.e., Pap smear and liquid-based cytology (LBC)) to screen for cervical cancer are time-consuming and dependent on the skill of the cytopathologist and thus are rather subjective. Therefore, this paper presents an intelligent computer vision system to assist pathologists in overcoming these problems and, consequently, produce more accurate results. The developed system consists of two stages. In the first stage, the automatic features extraction (AFE) algorithm is performed. In the second stage, a neuro-fuzzy model called multiple adaptive neuro-fuzzy inference system (MANFIS) is proposed for recognition process. The MANFIS contains a set of ANFIS models which are arranged in parallel combination to produce a model with multi-input-multioutput structure. The system is capable of classifying cervical cell image into three groups, namely, normal, low-grade squamous intraepithelial lesion (LSIL) and high-grade squamous intraepithelial lesion (HSIL). The experimental results prove the capability of the AFE algorithm to be as effective as the manual extraction by human experts, while the proposed MANFIS produces a good classification performance with 94.2% accuracy.
    Matched MeSH terms: Computer Systems
  4. Maherally Z, Fillmore HL, Tan SL, Tan SF, Jassam SA, Quack FI, et al.
    FASEB J, 2018 01;32(1):168-182.
    PMID: 28883042 DOI: 10.1096/fj.201700162R
    The blood-brain barrier (BBB) consists of endothelial cells, astrocytes, and pericytes embedded in basal lamina (BL). Most in vitro models use nonhuman, monolayer cultures for therapeutic-delivery studies, relying on transendothelial electrical resistance (TEER) measurements without other tight-junction (TJ) formation parameters. We aimed to develop reliable, reproducible, in vitro 3-dimensional (3D) models incorporating relevant human, in vivo cell types and BL proteins. The 3D BBB models were constructed with human brain endothelial cells, human astrocytes, and human brain pericytes in mono-, co-, and tricultures. TEER was measured in 3D models using a volt/ohmmeter and cellZscope. Influence of BL proteins-laminin, fibronectin, collagen type IV, agrin, and perlecan-on adhesion and TEER was assessed using an electric cell-substrate impedance-sensing system. TJ protein expression was assessed by Western blotting (WB) and immunocytochemistry (ICC). Perlecan (10 µg/ml) evoked unreportedly high, in vitro TEER values (1200 Ω) and the strongest adhesion. Coculturing endothelial cells with astrocytes yielded the greatest resistance over time. ICC and WB results correlated with resistance levels, with evidence of prominent occludin expression in cocultures. BL proteins exerted differential effects on TEER, whereas astrocytes in contact yielded higher TEER values and TJ expression.-Maherally, Z., Fillmore, H. L., Tan, S. L., Tan, S. F., Jassam, S. A., Quack, F. I., Hatherell, K. E., Pilkington, G. J. Real-time acquisition of transendothelial electrical resistance in an all-human, in vitro, 3-dimensional, blood-brain barrier model exemplifies tight-junction integrity.
    Matched MeSH terms: Computer Systems
  5. Hema CR, Paulraj MP, Yaacob S, Adom AH, Nagarajan R
    Adv Exp Med Biol, 2011;696:565-72.
    PMID: 21431597 DOI: 10.1007/978-1-4419-7046-6_57
    A brain machine interface (BMI) design for controlling the navigation of a power wheelchair is proposed. Real-time experiments with four able bodied subjects are carried out using the BMI-controlled wheelchair. The BMI is based on only two electrodes and operated by motor imagery of four states. A recurrent neural classifier is proposed for the classification of the four mental states. The real-time experiment results of four subjects are reported and problems emerging from asynchronous control are discussed.
    Matched MeSH terms: Computer Systems
  6. Poh CL, Tan EL
    Methods Mol Biol, 2011;665:65-77.
    PMID: 21116796 DOI: 10.1007/978-1-60761-817-1_5
    Enteroviruses are positive stranded RNA viruses belonging to the genus Enterovirus of the Picornaviridae family. Human enteroviruses are transmitted through the fecal-oral route and have been shown to cause mild to life-threatening diseases. Various diagnostic methods have been developed to detect enteroviruses from clinical specimens but many were impeded by requirements for special reagents, lengthy procedures, low sensitivity or cross-reactivity. This chapter describes rapid and highly sensitive methods of enteroviral detection directly from clinical specimens based on a conventional one-step Reverse Transcription polymerase chain reaction (RT-PCR) and a one-step real-time RT-PCR.
    Matched MeSH terms: Computer Systems
  7. Bahraminejad B, Basri S, Isa M, Hambli Z
    Sensors (Basel), 2010;10(6):5359-77.
    PMID: 22219666 DOI: 10.3390/s100605359
    In this study, the ability of the Capillary-attached conductive gas sensor (CGS) in real-time gas identification was investigated. The structure of the prototype fabricated CGS is presented. Portions were selected from the beginning of the CGS transient response including the first 11 samples to the first 100 samples. Different feature extraction and classification methods were applied on the selected portions. Validation of methods was evaluated to study the ability of an early portion of the CGS transient response in target gas (TG) identification. Experimental results proved that applying extracted features from an early part of the CGS transient response along with a classifier can distinguish short-chain alcohols from each other perfectly. Decreasing time of exposition in the interaction between target gas and sensing element improved the reliability of the sensor. Classification rate was also improved and time of identification was decreased. Moreover, the results indicated the optimum interval of the early transient response of the CGS for selecting portions to achieve the best classification rates.
    Matched MeSH terms: Computer Systems
  8. Abdul Rahim R, Pang JF, Chan KS, Leong LC, Sulaiman S, Abdul Manaf MS
    ISA Trans, 2007 Apr;46(2):131-45.
    PMID: 17367791
    The data distribution system of this project is divided into two types, which are a Two-PC Image Reconstruction System and a Two-PC Velocity Measurement System. Each data distribution system is investigated to see whether the results' refreshing rate of the corresponding measurement can be greater than the rate obtained by using a single computer in the same measurement system for each application. Each system has its own flow control protocol for controlling how data is distributed within the system in order to speed up the data processing time. This can be done if two PCs work in parallel. The challenge of this project is to define the data flow process and critical timing during data packaging, transferring and extracting in between PCs. If a single computer is used as a data processing unit, a longer time is needed to produce a measurement result. This insufficient real-time result will cause problems in a feedback control process when applying the system in industrial plants. To increase the refreshing rate of the measurement result, an investigation on a data distribution system is performed to replace the existing data processing unit.
    Matched MeSH terms: Computer Systems
  9. Awang Kalong N, Yusof M
    Int J Health Care Qual Assur, 2017 May 08;30(4):341-357.
    PMID: 28470137 DOI: 10.1108/IJHCQA-06-2016-0082
    Purpose The purpose of this paper is to discuss a systematic review on waste identification related to health information systems (HIS) in Lean transformation. Design/methodology/approach A systematic review was conducted on 19 studies to evaluate Lean transformation and tools used to remove waste related to HIS in clinical settings. Findings Ten waste categories were identified, along with their relationships and applications of Lean tool types related to HIS. Different Lean tools were used at the early and final stages of Lean transformation; the tool selection depended on the waste characteristic. Nine studies reported a positive impact from Lean transformation in improving daily work processes. The selection of Lean tools should be made based on the timing, purpose and characteristics of waste to be removed. Research limitations/implications Overview of waste and its category within HIS and its analysis from socio-technical perspectives enabled the identification of its root cause in a holistic and rigorous manner. Practical implications Understanding waste types, their root cause and review of Lean tools could subsequently lead to the identification of mitigation approach to prevent future error occurrence. Originality/value Specific waste models for HIS settings are yet to be developed. Hence, the identification of the waste categories could guide future implementation of Lean transformations in HIS settings.
    Matched MeSH terms: Computer Systems
  10. Mohsin AH, Zaidan AA, Zaidan BB, Albahri AS, Albahri OS, Alsalem MA, et al.
    J Med Syst, 2018 Oct 16;42(12):238.
    PMID: 30327939 DOI: 10.1007/s10916-018-1104-5
    The development of wireless body area sensor networks is imperative for modern telemedicine. However, attackers and cybercriminals are gradually becoming aware in attacking telemedicine systems, and the black market value of protected health information has the highest price nowadays. Security remains a formidable challenge to be resolved. Intelligent home environments make up one of the major application areas of pervasive computing. Security and privacy are the two most important issues in the remote monitoring and control of intelligent home environments for clients and servers in telemedicine architecture. The personal authentication approach that uses the finger vein pattern is a newly investigated biometric technique. This type of biometric has many advantages over other types (explained in detail later on) and is suitable for different human categories and ages. This study aims to establish a secure verification method for real-time monitoring systems to be used for the authentication of patients and other members who are working in telemedicine systems. The process begins with the sensor based on Tiers 1 and 2 (client side) in the telemedicine architecture and ends with patient verification in Tier 3 (server side) via finger vein biometric technology to ensure patient security on both sides. Multilayer taxonomy is conducted in this research to attain the study's goal. In the first layer, real-time remote monitoring studies based on the sensor technology used in telemedicine applications are reviewed and analysed to provide researchers a clear vision of security and privacy based on sensors in telemedicine. An extensive search is conducted to identify articles that deal with security and privacy issues, related applications are reviewed comprehensively and a coherent taxonomy of these articles is established. ScienceDirect, IEEE Xplore and Web of Science databases are checked for articles on mHealth in telemedicine based on sensors. A total of 3064 papers are collected from 2007 to 2017. The retrieved articles are filtered according to the security and privacy of telemedicine applications based on sensors. Nineteen articles are selected and classified into two categories. The first category, which accounts for 57.89% (n = 11/19), includes surveys on telemedicine articles and their applications. The second category, accounting for 42.1% (n = 8/19), includes articles on the three-tiered architecture of telemedicine. The collected studies reveal the essential need to construct another taxonomy layer and review studies on finger vein biometric verification systems. This map-matching for both taxonomies is developed for this study to go deeply into the sensor field and determine novel risks and benefits for patient security and privacy on client and server sides in telemedicine applications. In the second layer of our taxonomy, the literature on finger vein biometric verification systems is analysed and reviewed. In this layer, we obtain a final set of 65 articles classified into four categories. In the first category, 80% (n = 52/65) of the articles focus on development and design. In the second category, 12.30% (n = 8/65) includes evaluation and comparative articles. These articles are not intensively included in our literature analysis. In the third category, 4.61% (n = 3/65) includes articles about analytical studies. In the fourth category, 3.07% (n = 2/65) comprises reviews and surveys. This study aims to provide researchers with an up-to-date overview of studies that have been conducted on (user/patient) authentication to enhance the security level in telemedicine or any information system. In the current study, taxonomy is presented by explaining previous studies. Moreover, this review highlights the motivations, challenges and recommendations related to finger vein biometric verification systems and determines the gaps in this research direction (protection of finger vein templates in real time), which represent a new research direction in this area.
    Matched MeSH terms: Computer Systems
  11. Al-Ani AK, Anbar M, Manickam S, Al-Ani A
    PLoS One, 2019;14(4):e0214518.
    PMID: 30939154 DOI: 10.1371/journal.pone.0214518
    An efficiently unlimited address space is provided by Internet Protocol version 6 (IPv6). It aims to accommodate thousands of hundreds of unique devices on a similar link. This can be achieved through the Duplicate Address Detection (DAD) process. It is considered one of the core IPv6 network's functions. It is implemented to make sure that IP addresses do not conflict with each other on the same link. However, IPv6 design's functions are exposed to security threats like the DAD process, which is vulnerable to Denial of Service (DoS) attack. Such a threat prevents the host from configuring its IP address by responding to each Neighbor Solicitation (NS) through fake Neighbor Advertisement (NA). Various mechanisms have been proposed to secure the IPv6 DAD procedure. The proposed mechanisms, however, suffer from complexity, high processing time, and the consumption of more resources. The experiments-based findings revealed that all the existing mechanisms had failed to secure the IPv6 DAD process. Therefore, DAD-match security technique is proposed in this study to efficiently secure the DAD process consuming less processing time. DAD-match is built based on SHA-3 to hide the exchange tentative IP among hosts throughout the process of DAD in an IPv6 link-local network. The obtained experimental results demonstrated that the DAD-match security technique achieved less processing time compared with the existing mechanisms as it can resist a range of different threats like collision and brute-force attacks. The findings concluded that the DAD-match technique effectively prevents the DoS attack during the DAD process. The DAD-match technique is implemented on a small area IPv6 network; hence, the author future work is to implement and test the DAD-match technique on a large area IPv6 network.
    Matched MeSH terms: Computer Systems
  12. Kalid N, Zaidan AA, Zaidan BB, Salman OH, Hashim M, Muzammil H
    J Med Syst, 2017 Dec 29;42(2):30.
    PMID: 29288419 DOI: 10.1007/s10916-017-0883-4
    The growing worldwide population has increased the need for technologies, computerised software algorithms and smart devices that can monitor and assist patients anytime and anywhere and thus enable them to lead independent lives. The real-time remote monitoring of patients is an important issue in telemedicine. In the provision of healthcare services, patient prioritisation poses a significant challenge because of the complex decision-making process it involves when patients are considered 'big data'. To our knowledge, no study has highlighted the link between 'big data' characteristics and real-time remote healthcare monitoring in the patient prioritisation process, as well as the inherent challenges involved. Thus, we present comprehensive insights into the elements of big data characteristics according to the six 'Vs': volume, velocity, variety, veracity, value and variability. Each of these elements is presented and connected to a related part in the study of the connection between patient prioritisation and real-time remote healthcare monitoring systems. Then, we determine the weak points and recommend solutions as potential future work. This study makes the following contributions. (1) The link between big data characteristics and real-time remote healthcare monitoring in the patient prioritisation process is described. (2) The open issues and challenges for big data used in the patient prioritisation process are emphasised. (3) As a recommended solution, decision making using multiple criteria, such as vital signs and chief complaints, is utilised to prioritise the big data of patients with chronic diseases on the basis of the most urgent cases.
    Matched MeSH terms: Computer Systems
  13. Albahri OS, Albahri AS, Mohammed KI, Zaidan AA, Zaidan BB, Hashim M, et al.
    J Med Syst, 2018 Mar 22;42(5):80.
    PMID: 29564649 DOI: 10.1007/s10916-018-0943-4
    The new and ground-breaking real-time remote monitoring in triage and priority-based sensor technology used in telemedicine have significantly bounded and dispersed communication components. To examine these technologies and provide researchers with a clear vision of this area, we must first be aware of the utilised approaches and existing limitations in this line of research. To this end, an extensive search was conducted to find articles dealing with (a) telemedicine, (b) triage, (c) priority and (d) sensor; (e) comprehensively review related applications and establish the coherent taxonomy of these articles. ScienceDirect, IEEE Xplore and Web of Science databases were checked for articles on triage and priority-based sensor technology in telemedicine. The retrieved articles were filtered according to the type of telemedicine technology explored. A total of 150 articles were selected and classified into two categories. The first category includes reviews and surveys of triage and priority-based sensor technology in telemedicine. The second category includes articles on the three-tiered architecture of telemedicine. Tier 1 represents the users. Sensors acquire the vital signs of the users and send them to Tier 2, which is the personal gateway that uses local area network protocols or wireless body area network. Medical data are sent from Tier 2 to Tier 3, which is the healthcare provider in medical institutes. Then, the motivation for using triage and priority-based sensor technology in telemedicine, the issues related to the obstruction of its application and the development and utilisation of telemedicine are examined on the basis of the findings presented in the literature.
    Matched MeSH terms: Computer Systems
  14. Reza SM, Ahmad N, Choudhury IA, Ghazilla RA
    Sensors (Basel), 2014 Mar 04;14(3):4342-63.
    PMID: 24599193 DOI: 10.3390/s140304342
    Human motion is a daily and rhythmic activity. The exoskeleton concept is a very positive scientific approach for human rehabilitation in case of lower limb impairment. Although the exoskeleton shows potential, it is not yet applied extensively in clinical rehabilitation. In this research, a fuzzy based control algorithm is proposed for lower limb exoskeletons during sit-to-stand and stand-to-sit movements. Surface electromyograms (EMGs) are acquired from the vastus lateralis muscle using a wearable EMG sensor. The resultant acceleration angle along the z-axis is determined from a kinematics sensor. Twenty volunteers were chosen to perform the experiments. The whole experiment was accomplished in two phases. In the first phase, acceleration angles and EMG data were acquired from the volunteers during both sit-to-stand and stand-to-sit motions. During sit-to-stand movements, the average acceleration angle at activation was 11°-48° and the EMG varied from -0.19 mV to +0.19 mV. On the other hand, during stand-to-sit movements, the average acceleration angle was found to be 57.5°-108° at the activation point and the EMG varied from -0.32 mV to +0.32 mV. In the second phase, a fuzzy controller was designed from the experimental data. The controller was tested and validated with both offline and real time data using LabVIEW.
    Matched MeSH terms: Computer Systems
  15. Salman OH, Rasid MF, Saripan MI, Subramaniam SK
    J Med Syst, 2014 Sep;38(9):103.
    PMID: 25047520 DOI: 10.1007/s10916-014-0103-4
    The healthcare industry is streamlining processes to offer more timely and effective services to all patients. Computerized software algorithm and smart devices can streamline the relation between users and doctors by providing more services inside the healthcare telemonitoring systems. This paper proposes a multi-sources framework to support advanced healthcare applications. The proposed framework named Multi Sources Healthcare Architecture (MSHA) considers multi-sources: sensors (ECG, SpO2 and Blood Pressure) and text-based inputs from wireless and pervasive devices of Wireless Body Area Network. The proposed framework is used to improve the healthcare scalability efficiency by enhancing the remote triaging and remote prioritization processes for the patients. The proposed framework is also used to provide intelligent services over telemonitoring healthcare services systems by using data fusion method and prioritization technique. As telemonitoring system consists of three tiers (Sensors/ sources, Base station and Server), the simulation of the MSHA algorithm in the base station is demonstrated in this paper. The achievement of a high level of accuracy in the prioritization and triaging patients remotely, is set to be our main goal. Meanwhile, the role of multi sources data fusion in the telemonitoring healthcare services systems has been demonstrated. In addition to that, we discuss how the proposed framework can be applied in a healthcare telemonitoring scenario. Simulation results, for different symptoms relate to different emergency levels of heart chronic diseases, demonstrate the superiority of our algorithm compared with conventional algorithms in terms of classify and prioritize the patients remotely.
    Matched MeSH terms: Computer Systems
  16. Faisal A, Parveen S, Badsha S, Sarwar H, Reza AW
    J Med Syst, 2013 Jun;37(3):9938.
    PMID: 23504472 DOI: 10.1007/s10916-013-9938-3
    An improved and efficient method is presented in this paper to achieve a better trade-off between noise removal and edge preservation, thereby detecting the tumor region of MRI brain images automatically. Compass operator has been used in the fourth order Partial Differential Equation (PDE) based denoising technique to preserve the anatomically significant information at the edges. A new morphological technique is also introduced for stripping skull region from the brain images, which consequently leading to the process of detecting tumor accurately. Finally, automatic seeded region growing segmentation based on an improved single seed point selection algorithm is applied to detect the tumor. The method is tested on publicly available MRI brain images and it gives an average PSNR (Peak Signal to Noise Ratio) of 36.49. The obtained results also show detection accuracy of 99.46%, which is a significant improvement than that of the existing results.
    Matched MeSH terms: Computer Systems
  17. Samy GN, Ahmad R, Ismail Z
    Health Informatics J, 2010 Sep;16(3):201-9.
    PMID: 20889850 DOI: 10.1177/1460458210377468
    This article attempts to investigate the various types of threats that exist in healthcare information systems (HIS). A study has been carried out in one of the government-supported hospitals in Malaysia.The hospital has been equipped with a Total Hospital Information System (THIS). The data collected were from three different departments, namely the Information Technology Department (ITD), the Medical Record Department (MRD), and the X-Ray Department, using in-depth structured interviews. The study identified 22 types of threats according to major threat categories based on ISO/IEC 27002 (ISO 27799:2008). The results show that the most critical threat for the THIS is power failure followed by acts of human error or failure and other technological factors. This research holds significant value in terms of providing a complete taxonomy of threat categories in HIS and also an important component in the risk analysis stage.
    Matched MeSH terms: Computer Systems
  18. Wibowo TC, Saad N
    ISA Trans, 2010 Jul;49(3):335-47.
    PMID: 20304404 DOI: 10.1016/j.isatra.2010.02.005
    This paper discusses the empirical modeling using system identification technique with a focus on an interacting series process. The study is carried out experimentally using a gaseous pilot plant as the process, in which the dynamic of such a plant exhibits the typical dynamic of an interacting series process. Three practical approaches are investigated and their performances are evaluated. The models developed are also examined in real-time implementation of a linear model predictive control. The selected model is able to reproduce the main dynamic characteristics of the plant in open-loop and produces zero steady-state errors in closed-loop control system. Several issues concerning the identification process and the construction of a MIMO state space model for a series interacting process are deliberated.
    Matched MeSH terms: Computer Systems
  19. Ming Fung Ng, Hoe Tung Yew, Seng Kheau Chung, Syed Shajee Husain, Nelbon Giloi
    MyJurnal
    Introduction: Cardiovascular diseases remain as the principal cause of death in Malaysia. The rural areas in Sabah still suffer from shortage of doctors and specialists. Health Indicators 2018 from Ministry of Health Malaysia shows the ratio of doctor to population in Sabah is 1:1029. The lack of specialist care for the rural population is a major concern. To overcome the barrier of healthcare services, deployment of telecardiology system is necessary. The objective of this project is to develop a real-time telecardiology system that can transmit and guarantee the quality of the ECG signal. Methods: The proposed real-time telecardiology system used an ECG sensor AD8232 to collect the ECG signal. Arduino ESP32 as a main controller of the system. It uploads the collected ECG data to the online database in real-time through Wi-Fi or cellular network with MQTT protocol. A website is developed for displaying the real-time ECG signal. Results: The proposed system has successfully displayed the ECG signal in real-time with 10000 ECG raw data were tested and stored in online database with no package loss and package error during the data transmission. The online system able to display real-time ECG signal and BPM on webpage. The real-time BPM is extracted from the real-time ECG raw data. Conclusion: The proposed real-time telecardiology system has success-fully transmitted ECG in real-time with high data integrity. Telecardiology is one of the best solutions to resolve the issue of shortage of healthcare professionals in rural areas and improve the healthcare quality in rural areas.
    Matched MeSH terms: Computer Systems
  20. Nasir MSM, Ab-Kadir MZA, Radzi MAM, Izadi M, Ahmad NI, Zaini NH
    PLoS One, 2019;14(7):e0219326.
    PMID: 31295278 DOI: 10.1371/journal.pone.0219326
    The Sustainable Energy Development Authority of Malaysia (SEDA) regularly receives complaints about damaged components and distribution boards of PV systems due to lightning strikes. Permanent and momentary interruptions of distribution circuits may also occur from the disturbance. In this paper, a solar PV Rooftop system (3.91 kWp) provided by SEDA was modelled in the PSCAD/EMTDC. The Heidler function was used as a lightning current waveform model to analyse the transient current and voltage at two different points susceptible to the influence of lightning events such as different lightning current wave shape, standard lightning current and non-standard lightning current. This study examines the effect on the system components when lightning directly strikes at two different points of the installation. The two points lie between the inverter and the solar PV array and between inverter and grid. Exceptionally high current and voltage due to the direct lightning strike on a certain point of a PV Rooftop system was also studied. The result of this case study is observed with and without the inclusion of surge protective devices (SPDs). The parameters used were 31 kA of peak current, 10 metres cable length and lightning impulse current wave shape of 8/20μs. The high current and voltage at P1 striking point were 31 kA and 2397 kV, respectively. As for the AC part, the current and voltage values were found to be 5.97 kA and 5392 kV, respectively.Therefore, SPDs with suitable rating provided by SEDA were deployed. Results showed that high transient current voltage is expected to clamp sharply at the values of 1.915 kV and 0 A at the P1 striking point. As for the AC part, the current and voltage values were found to be 0 kA and 0.751 V, respectively. Varying lightning impulse current wave shapes at striking point P2 showed that the highest voltage was obtained at waveshape 10/350 μs at 11277 kV followed by wave shapes of 2/70 μs, 8/20 μs and 0.7/6 μs. The high value of transient voltage was clamped at a lower level of 2.029 kV. Different lightning amplitudes were also applied, ranging from 2-200 kA selected based on the CIGRE distribution. It showed that the current and voltage at P1 and P2 were directly proportional. Therefore, the SPD will be designed at an acceptable rating and proper position of SPD installation at solar PV Rooftop will be proposed. The results obtained in this study can then be utilised to appropriately assign a SPD to protect the PV systems that are connected to the grid. Installing SPDs without considering the needs of lightning protection zones would expose the expensive equipment to potential damage even though the proper energy coordination of SPDs is in place. As such, the simulation results provide a basis for controlling the impacts of direct lightning strikes on electrical equipment and power grids and thus justify SPD coordination to ensure the reliability of the system.
    Matched MeSH terms: Computer Systems
Related Terms
Filters
Contact Us

Please provide feedback to Administrator (afdal@afpm.org.my)

External Links