Displaying publications 41 - 60 of 353 in total

Abstract:
Sort:
  1. Ahsan M, Seldon HL, Sayeed S
    PMID: 23138074
    Ubiquitous personal health records, which can accompany a person everywhere, are a necessary requirement for ubiquitous healthcare. Contextual information related to health events is important for the diagnosis and treatment of disease and for the maintenance of good health, yet it is seldom recorded in a health record. We describe a dual cellphone-and-Web-based personal health record system which can include 'external' contextual information. Much contextual information is available on the Internet and we can use ontologies to help identify relevant sites and information. But a search engine is required to retrieve information from the Web and developing a customized search engine is beyond our scope, so we can use Google Custom Search API Web service to get contextual data. In this paper we describe a framework which combines a health-and-environment 'knowledge base' or ontology with the Google Custom Search API to retrieve relevant contextual information related to entries in a ubiquitous personal health record.
    Matched MeSH terms: Internet*
  2. Syed-Mohamad SM, Ali SH, Mat-Husin MN
    Health Inf Manag, 2010;39(1):30-5.
    PMID: 20335647
    This paper describes the method used to develop the One Stop Crisis Centre (OSCC) Portal, an open source web-based electronic patient record system (EPR) for the One Stop Crisis Center, Hospital Universiti Sains Malaysia (HUSM) in Kelantan, Malaysia. Features and functionalities of the system are presented to demonstrate the workflow. Use of the OSCC Portal improved data integration and data communication and contributed to improvements in care management. With implementation of the OSCC portal, improved coordination between disciplines and standardisation of data in HUSM were noticed. It is expected that this will in turn result in improved data confidentiality and data integrity. The collected data will also be useful for quality assessment and research. Other low-resource centers with limited computer hardware and access to open-source software could benefit from this endeavour.
    Matched MeSH terms: Internet*
  3. Alizadeh M, Zamani M, Baharun S, Abdul Manaf A, Sakurai K, Anada H, et al.
    PLoS One, 2015;10(11):e0142716.
    PMID: 26580963 DOI: 10.1371/journal.pone.0142716
    Proxy Mobile IPv6 is a network-based localized mobility management protocol that supports mobility without mobile nodes' participation in mobility signaling. The details of user authentication procedure are not specified in this standard, hence, many authentication schemes have been proposed for this standard. In 2013, Chuang et al., proposed an authentication method for PMIPv6, called SPAM. However, Chuang et al.'s Scheme protects the network against some security attacks, but it is still vulnerable to impersonation and password guessing attacks. In addition, we discuss other security drawbacks such as lack of revocation procedure in case of loss or stolen device, and anonymity issues of the Chuang et al.'s scheme. We further propose an enhanced authentication method to mitigate the security issues of SPAM method and evaluate our scheme using BAN logic.
    Matched MeSH terms: Internet*
  4. Ng KH, Niroomand-Rad A, Hendee WR
    Med Phys, 2001 Dec;28(12):2391-3.
    PMID: 11797940
    Matched MeSH terms: Internet/trends*
  5. Ooi CY, Ng CJ, Sales AE, Lim HM
    J Med Internet Res, 2020 07 20;22(7):e15591.
    PMID: 32706655 DOI: 10.2196/15591
    BACKGROUND: Screening is an effective primary prevention strategy in health care, as it enables the early detection of diseases. However, the uptake of such screening remains low. Different delivery methods for screening have been developed and found to be effective in increasing the uptake of screening, including the use of web-based apps. Studies have shown that web-based apps for screening are effective in increasing the uptake of health screening among the general population. However, not much is known about the effective implementation of such web-based apps in the real-world setting. Implementation strategies are theory-based methods or techniques used to enhance the adoption, implementation, and sustainability of evidence-based interventions. Implementation strategies are important, as they allow us to understand how to implement an evidence-based intervention. Therefore, a scoping review to identify the various implementation strategies for web-based apps for screening is warranted.

    OBJECTIVE: This scoping review aims to identify (1) strategies used to implement web-based apps for health screening, (2) frameworks used for implementing web-based apps for health screening, (3) outcome measures of implementation strategies, and (4) effective implementation strategies.

    METHODS: This scoping review was conducted based on Arksey and O'Malley's framework. After identifying the review question, two researchers independently screened and selected relevant literature from PubMed, Embase, Cochrane, Cumulative Index of Nursing and Allied Health Literature, PsycINFO, International Standard Randomised Controlled Trial Number Registry, OpenGrey, ClinicalTrials.gov, World Health Organization International Clinical Trials Registry Platform, and Web of Science. This was followed by charting the data using a standardized form. Finally, we collated, summarized, and reported the results quantitatively and qualitatively based on the review objectives.

    RESULTS: A total of 16,476 studies were retrieved, of which 5669 were duplicates. From a total of 10,807 studies, 10,784 studies were excluded based on their titles and abstracts. There were 23 full-text articles reviewed, and 4 articles were included in the final analysis. Many studies were excluded because they focused on the effectiveness and not on the implementation of web-based apps. Facilitation was the most cited implementation strategy used, followed by reminders, clinical champions, and educational meetings and materials. Only 2 studies used implementation frameworks to guide the evaluation of their studies. Common outcome measures for implementation strategies were feasibility, fidelity, and penetration. Implementation strategies reported to be effective were quality improvement meetings, facilitation, educational meetings, and clinical champions.

    CONCLUSIONS: There is a dearth of literature on the implementation of web-based apps for health screening. Implementation strategies were developed without any reported use of implementation theories or frameworks in most studies. More research on the development and evaluation of web-based screening app implementations is needed.

    Matched MeSH terms: Internet/standards*
  6. Akhtar M, Fatima T
    J Pak Med Assoc, 2020 Jan;70(1):90-95.
    PMID: 31954030 DOI: 10.5455/JPMA.8682
    Objective: To study the phenomenon of cyberchondria and related worries about health among individuals without any diagnosed medical condition. .

    METHODS: The survey-based, cross-sectional study was conducted from January to July 2018 in the twin cities of Rawalpindi and Islamabad, Pakistan, and comprised graduates of either gender aged at least 35 years with access to internet and means of use, and with no current diagnosed medical condition. The self-reporting Cyberchondria Severity Scale was used data-collection along with a demographic sheet. SPSS 21 was used for data analysis.

    RESULTS: Of the 150 subjects, 90(60%) were men and 60(40%) were women. A total of 40(26.6%) subjects had low level of cyberchondria, while 35(23.3%) experienced a higher level of it. Mean scores of men on total CSS were slightly higher than those of women (p>0.05). Men also scored higher on compulsion, distress, excessiveness and reassurance subsclaes (p>0.05 each), whereas women scored slightly higherthan men on 'mistrust of medical profession' subscale (p>0.05). No significant gender differences werefound on cyberchondria and its subscales (p>0.05 each).

    CONCLUSIONS: Doctors / health professionals may benefit from the findings by focussing on their patients who use internet as a major source of medical information.

    Matched MeSH terms: Internet*
  7. Ghaleb SM, Subramaniam S, Zukarnain ZA, Muhammed A, Ghaleb M
    PLoS One, 2019;14(3):e0212490.
    PMID: 30845160 DOI: 10.1371/journal.pone.0212490
    Recently, the mobility management of urban vehicular networks has become great challenges for researchers due to its unique mobility requirements imposed by mobile users when accessing different services in a random fashion. To provide a ubiquitous Internet and seamless connectivity, the Internet Engineering Task Force (IETF) has proposed a Proxy Mobile IPv6 (PMIPv6) protocol. This is meant to address the signaling of the mobility transparent to the Mobile Node (MN) and also guarantee session continuity while the MN is in motion. However, performing a handoff by tens of thousands of MNs may harm the performance of the system significantly due to the high signaling overhead and the insufficient utilization of so-called Binding Cash Entry (BCE) at the Local Mobility Anchor (LMA). To address these issues, we propose an efficient scheme within the PMIPv6 protocol, named AE-PMIPv6 scheme, to effectively utilize the BCE at the LMA. This is primarily achieved by merging the BCEs of the MNs, thus, reducing the signaling overhead. Better utilization of the BCEs has been attained by employing virtual addresses and addressing pool mechanisms for the purpose of binding information of the MNs that are moving together towards the same network at a specific time, during their handoff process. Results obtained from our simulation demonstrates the superiority of AE-PMIPv6 scheme over E-PMIPv6 scheme. The AE-PMIPv6 succeeds in minimizing the signaling overhead, reduces the handover time and at the same time efficiently utilize the buffer resources.
    Matched MeSH terms: Internet*
  8. Tanusha N, Leelavathi M, Azimah NM
    Med J Malaysia, 2023 Nov;78(6):763-767.
    PMID: 38031218
    INTRODUCTION: Digital devices are an integral part of children's lives, and its use is associated with both risks and benefits. The aim of this study was to determine parent's perception of digital device use among their preschool children.

    MATERIALS AND METHODS: A cross-sectional study was conducted among parents of 145 children in the year 2020. Participants were selected using multistage randomisation technique from 10 of the 75 registered government kindergartens in Kota Setar District, Kedah. Data were collected using a self-administered questionnaire. Analysis was done using descriptive statistics and the association between parent's demographic characteristics and the overall perception of digital media use by their preschool children was tested using Chi-square test.

    RESULTS: A total of 150 questionnaires were distributed, and 145 were returned (96.7% response rate) out of which 139 were complete. We found that parent's overall perception of their preschool children using digital devices was mixed, where about one-third of them perceived that digital device use was a risk, one-third perceived it as beneficial while onethird were unsure. The common perception of risk was that digital devices impaired children's physical (71.9-90.6%) and intellectual domains (71.9-86.3%) especially causing damage to eyesight (90.6%), causing addiction (86.3%) and exposed to radiation (81.3%). The perceived benefits of using digital device were mainly in the social domain, promoting technology awareness (64.8%), easily accessible and portable (63.3%) and entertaining (64.0%). They also perceived that digital devices promoted creative and interactive learning (62.6%). Parent's overall perception of digital media use was associated with their employment status (p=0.028).

    CONCLUSION: Parent's overall perception regarding digital device use among their preschool children was mixed. They perceived that digital devices commonly cause risk to the physical and intellectual aspects of their children while there are some benefits to the social aspects. There is an association between parent's overall perception and employment status.

    Matched MeSH terms: Internet*
  9. Halboub E, Al-Ak'hali MS, Al-Mekhlafi HM, Alhajj MN
    BMC Public Health, 2021 01 18;21(1):151.
    PMID: 33461516 DOI: 10.1186/s12889-021-10218-9
    BACKGROUND: This study sought to assess the quality and readability of web-based Arabic health information on COVID-19.

    METHODS: Three search engines were searched on 13 April 2020 for specific Arabic terms on COVID-19. The first 100 consecutive websites from each engine were analyzed for eligibility, which resulted in a sample of 36 websites. These websites were subjected to quality assessments using the Journal of the American Medical Association (JAMA) benchmarks tool, the DISCERN tool, and Health on the Net Foundation Code of Conduct (HONcode) certification. The readability of the websites was assessed using an online readability calculator.

    RESULTS: Among the 36 eligible websites, only one (2.7%) was HONcode certified. No website attained a high score based on the criteria of the DISCERN tool; the mean score of all websites was 31.5 ± 12.55. As regards the JAMA benchmarks results, a mean score of 2.08 ± 1.05 was achieved by the websites; however, only four (11.1%) met all the JAMA criteria. The average grade levels for readability were 7.2 ± 7.5, 3.3 ± 0.6 and 93.5 ± 19.4 for the Flesch Kincaid Grade Level, Simple Measure of Gobbledygook, and Flesch Reading Ease scales, respectively.

    CONCLUSION: Almost all of the most easily accessible web-based Arabic health information on COVID-19 does not meet recognized quality standards regardless of the level of readability and ability to be understood by the general population of Arabic speakers.

    Matched MeSH terms: Internet*
  10. Müller AM, Khoo S
    Acta Paediatr, 2016 Mar;105(3):234-43.
    PMID: 26663504 DOI: 10.1111/apa.13307
    Physical activity promotes health in children and adolescents, but activity levels are low. The Internet offers opportunities for physical activity interventions because children and adolescents are widely exposed to the web and enjoy being online. This review investigated the success of Internet-based interventions designed to increase physical activity in children and adolescents. Of the 13 studies we included, five reported that Internet-based interventions had significant effects on most physical activities.
    Matched MeSH terms: Internet
  11. Khan AM, Tan TW, Schönbach C, Ranganathan S
    PLoS Comput Biol, 2013 Oct;9(10):e1003317.
    PMID: 24204244 DOI: 10.1371/journal.pcbi.1003317
    Matched MeSH terms: Internet
  12. Hashmi ZI, Abidi SS, Cheah YN
    PMID: 15460764
    Initiatives in healthcare knowledge management have provided some interesting solutions for the implementation of large-scale information repositories vis-à-vis the implementation of Healthcare Enterprise Memories (HEM). In this paper, we present an agent-based Intelligent Healthcare Information Assistant (IHIA) for dynamic information gathering, filtering and adaptation from a HEM comprising an amalgamation of (i) databases storing empirical knowledge, (ii) case-bases storing experiential knowledge, (iii) scenario-bases storing tacit knowledge and (iv) document-bases storing explicit knowledge. The featured work leverages intelligent agents and medical ontologies for autonomous HEM-wide navigation, approximate content matching, inter- and intra-repositories content correlation and information adaptation to meet the user's information request. We anticipate that the use of IHIA will empower healthcare stakeholders to actively communicate with an 'information/knowledge-rich' HEM and will be able to retrieve with ease 'useful' task-specific information via the presentation of cognitively intuitive queries.
    Matched MeSH terms: Internet
  13. Reafee W, Salim N, Khan A
    PLoS One, 2016;11(5):e0154848.
    PMID: 27152663 DOI: 10.1371/journal.pone.0154848
    The explosive growth of social networks in recent times has presented a powerful source of information to be utilized as an extra source for assisting in the social recommendation problems. The social recommendation methods that are based on probabilistic matrix factorization improved the recommendation accuracy and partly solved the cold-start and data sparsity problems. However, these methods only exploited the explicit social relations and almost completely ignored the implicit social relations. In this article, we firstly propose an algorithm to extract the implicit relation in the undirected graphs of social networks by exploiting the link prediction techniques. Furthermore, we propose a new probabilistic matrix factorization method to alleviate the data sparsity problem through incorporating explicit friendship and implicit friendship. We evaluate our proposed approach on two real datasets, Last.Fm and Douban. The experimental results show that our method performs much better than the state-of-the-art approaches, which indicates the importance of incorporating implicit social relations in the recommendation process to address the poor prediction accuracy.
    Matched MeSH terms: Internet
  14. Zubair S, Syed Yusoff SK, Fisal N
    Sensors (Basel), 2016;16(2):172.
    PMID: 26840312 DOI: 10.3390/s16020172
    The emergence of the Internet of Things and the proliferation of mobile wireless devices has brought the area of mobile cognitive radio sensor networks (MCRSN) to the research spot light. Notwithstanding the potentials of CRSNs in terms of opportunistic channel usage for bursty traffic, the effect of the mobility of resource-constrained nodes to route stability, mobility-induced spatio-temporal spectral opportunities and primary user (PU) protection still remain open issues that need to be jointly addressed. To this effect, this paper proposes a mobile reliable geographical forwarding routing (MROR) protocol. MROR provides a robust mobile framework for geographical forwarding that is based on a mobility-induced channel availability model. It presents a comprehensive routing strategy that considers PU activity (to take care of routes that have to be built through PU coverage), PU signal protection (by the introduction of a mobility-induced guard (mguard) distance) and the random mobility-induced spatio-temporal spectrum opportunities (for enhancement of throughput). It also addresses the issue of frequent route maintenance that arises when speeds of the mobile nodes are considered as a routing metric. As a result, simulation has shown the ability of MROR to reduce the route failure rate by about 65% as against other schemes. In addition, further results show that MROR can improve both the throughput and goodput at the sink in an energy-efficient manner that is required in CRSNs as against compared works.
    Matched MeSH terms: Internet
  15. Yang C, Guadamuz TE, Lim SH, Koe S, Wei C
    LGBT Health, 2016 Apr;3(2):168-74.
    PMID: 26789393 DOI: 10.1089/lgbt.2014.0041
    We explored factors associated with alcohol use before or during sex among a sample of 10,861 men who have sex with men (MSM) in Asia who were recruited online for the study. Multinomial logistic regression analysis indicated that having sex under the influence of alcohol was associated with having multiple male partners, seeking partners primarily through gay bar/gym/dance party/friends, selling sex and using multiple drugs during the past 6 months, and unprotected anal sex. More efforts are needed to better assess alcohol use and misuse among MSM in Asia and understand contextual influences on alcohol use and HIV-related behaviors in order to implement culturally-specific interventions.
    Matched MeSH terms: Internet
  16. Homaei MH, Salwana E, Shamshirband S
    Sensors (Basel), 2019 Jul 18;19(14).
    PMID: 31323905 DOI: 10.3390/s19143173
    "Internet of Things (IoT)" has emerged as a novel concept in the world of technology and communication. In modern network technologies, the capability of transmitting data through data communication networks (such as Internet or intranet) is provided for each organism (e.g. human beings, animals, things, and so forth). Due to the limited hardware and operational communication capability as well as small dimensions, IoT undergoes several challenges. Such inherent challenges not only cause fundamental restrictions in the efficiency of aggregation, transmission, and communication between nodes; but they also degrade routing performance. To cope with the reduced availability time and unstable communications among nodes, data aggregation, and transmission approaches in such networks are designed more intelligently. In this paper, a distributed method is proposed to set child balance among nodes. In this method, the height of the network graph increased through restricting the degree; and network congestion reduced as a result. In addition, a dynamic data aggregation approach based on Learning Automata was proposed for Routing Protocol for Low-Power and Lossy Networks (LA-RPL). More specifically, each node was equipped with learning automata in order to perform data aggregation and transmissions. Simulation and experimental results indicate that the LA-RPL has better efficiency than the basic methods used in terms of energy consumption, network control overhead, end-to-end delay, loss packet and aggregation rates.
    Matched MeSH terms: Internet
  17. Mustaffa Samad
    Scientific Research Journal, 2006;3(1):27-36.
    MyJurnal
    The Internet has been an integral part of the Information and Communication
    Technology (ICT) community in recent years. New internet users have been
    growing steadily over the years. This has lead to the depletion of new Internet
    Protocol (IP) addresses worldwide. To overcome this predicament, the new
    Internet Protocol version 6 (IPv6) had been introduced. The existing Internet
    Protocol version 4 (IPv4) is expected to be eventually replaced by this IPv6.
    The changeover from IPv4 to IPv6 is expected to be implemented progressively.
    During this transition period, these two protocols are expected to coexist for
    a number of years. IPv4-to-IPv6 transition tools have been designed to facilitate
    a smooth transition from IPv4 to IPv6. The two most basic IPv4-to-IPv6
    transition tools available are the hybrid stack mechanism and tunneling.
    Tunneling is the encapsulation of IPv6 traffic within IPv4 packets so they can
    be sent over an IPv4 infrastructure. This project was initiated to set up an
    experimental IPv6 testbed, in order to study the performance as well as
    transition and migration issues of IPv6 networks under controlled conditions.
    This paper looks at how tunneling can be performed over existing internetwork
    infrastructure at Fakulti Kejuruteraan Elektrik (FKE), UiTM.
    Matched MeSH terms: Internet
  18. Bello H, Xiaoping Z, Nordin R, Xin J
    Sensors (Basel), 2019 Jul 12;19(14).
    PMID: 31336834 DOI: 10.3390/s19143078
    Wake-up radio is a promising approach to mitigate the problem of idle listening, which incurs additional power consumption for the Internet of Things (IoT) wireless transmission. Radio frequency (RF) energy harvesting technique allows the wake-up radio to remain in a deep sleep and only become active after receiving an external RF signal to 'wake-up' the radio, thus eliminating necessary hardware and signal processing to perform idle listening, resulting in higher energy efficiency. This review paper focuses on cross-layer; physical and media access control (PHY and MAC) approaches on passive wake-up radio based on the previous works from the literature. First, an explanation of the circuit design and system architecture of the passive wake-up radios is presented. Afterward, the previous works on RF energy harvesting techniques and the existing passive wake-up radio hardware architectures available in the literature are surveyed and classified. An evaluation of the various MAC protocols utilized for the novel passive wake-up radio technologies is presented. Finally, the paper highlights the potential research opportunities and practical challenges related to the practical implementation of wake-up technology for future IoT applications.
    Matched MeSH terms: Internet
  19. Rani R, Kumar S, Kaiwartya O, Khasawneh AM, Lloret J, Al-Khasawneh MA, et al.
    Sensors (Basel), 2021 Mar 08;21(5).
    PMID: 33800227 DOI: 10.3390/s21051883
    Postquantum cryptography for elevating security against attacks by quantum computers in the Internet of Everything (IoE) is still in its infancy. Most postquantum based cryptosystems have longer keys and signature sizes and require more computations that span several orders of magnitude in energy consumption and computation time, hence the sizes of the keys and signature are considered as another aspect of security by green design. To address these issues, the security solutions should migrate to the advanced and potent methods for protection against quantum attacks and offer energy efficient and faster cryptocomputations. In this context, a novel security framework Lightweight Postquantum ID-based Signature (LPQS) for secure communication in the IoE environment is presented. The proposed LPQS framework incorporates a supersingular isogeny curve to present a digital signature with small key sizes which is quantum-resistant. To reduce the size of the keys, compressed curves are used and the validation of the signature depends on the commutative property of the curves. The unforgeability of LPQS under an adaptively chosen message attack is proved. Security analysis and the experimental validation of LPQS are performed under a realistic software simulation environment to assess its lightweight performance considering embedded nodes. It is evident that the size of keys and the signature of LPQS is smaller than that of existing signature-based postquantum security techniques for IoE. It is robust in the postquantum environment and efficient in terms of energy and computations.
    Matched MeSH terms: Internet
  20. Abdulhussain SH, Ramli AR, Saripan MI, Mahmmod BM, Al-Haddad SAR, Jassim WA
    Entropy (Basel), 2018 Mar 23;20(4).
    PMID: 33265305 DOI: 10.3390/e20040214
    The recent increase in the number of videos available in cyberspace is due to the availability of multimedia devices, highly developed communication technologies, and low-cost storage devices. These videos are simply stored in databases through text annotation. Content-based video browsing and retrieval are inefficient due to the method used to store videos in databases. Video databases are large in size and contain voluminous information, and these characteristics emphasize the need for automated video structure analyses. Shot boundary detection (SBD) is considered a substantial process of video browsing and retrieval. SBD aims to detect transition and their boundaries between consecutive shots; hence, shots with rich information are used in the content-based video indexing and retrieval. This paper presents a review of an extensive set for SBD approaches and their development. The advantages and disadvantages of each approach are comprehensively explored. The developed algorithms are discussed, and challenges and recommendations are presented.
    Matched MeSH terms: Internet
Filters
Contact Us

Please provide feedback to Administrator (afdal@afpm.org.my)

External Links