Displaying publications 61 - 69 of 69 in total

Abstract:
Sort:
  1. Mohsin AH, Zaidan AA, Zaidan BB, Albahri AS, Albahri OS, Alsalem MA, et al.
    J Med Syst, 2018 Oct 16;42(12):238.
    PMID: 30327939 DOI: 10.1007/s10916-018-1104-5
    The development of wireless body area sensor networks is imperative for modern telemedicine. However, attackers and cybercriminals are gradually becoming aware in attacking telemedicine systems, and the black market value of protected health information has the highest price nowadays. Security remains a formidable challenge to be resolved. Intelligent home environments make up one of the major application areas of pervasive computing. Security and privacy are the two most important issues in the remote monitoring and control of intelligent home environments for clients and servers in telemedicine architecture. The personal authentication approach that uses the finger vein pattern is a newly investigated biometric technique. This type of biometric has many advantages over other types (explained in detail later on) and is suitable for different human categories and ages. This study aims to establish a secure verification method for real-time monitoring systems to be used for the authentication of patients and other members who are working in telemedicine systems. The process begins with the sensor based on Tiers 1 and 2 (client side) in the telemedicine architecture and ends with patient verification in Tier 3 (server side) via finger vein biometric technology to ensure patient security on both sides. Multilayer taxonomy is conducted in this research to attain the study's goal. In the first layer, real-time remote monitoring studies based on the sensor technology used in telemedicine applications are reviewed and analysed to provide researchers a clear vision of security and privacy based on sensors in telemedicine. An extensive search is conducted to identify articles that deal with security and privacy issues, related applications are reviewed comprehensively and a coherent taxonomy of these articles is established. ScienceDirect, IEEE Xplore and Web of Science databases are checked for articles on mHealth in telemedicine based on sensors. A total of 3064 papers are collected from 2007 to 2017. The retrieved articles are filtered according to the security and privacy of telemedicine applications based on sensors. Nineteen articles are selected and classified into two categories. The first category, which accounts for 57.89% (n = 11/19), includes surveys on telemedicine articles and their applications. The second category, accounting for 42.1% (n = 8/19), includes articles on the three-tiered architecture of telemedicine. The collected studies reveal the essential need to construct another taxonomy layer and review studies on finger vein biometric verification systems. This map-matching for both taxonomies is developed for this study to go deeply into the sensor field and determine novel risks and benefits for patient security and privacy on client and server sides in telemedicine applications. In the second layer of our taxonomy, the literature on finger vein biometric verification systems is analysed and reviewed. In this layer, we obtain a final set of 65 articles classified into four categories. In the first category, 80% (n = 52/65) of the articles focus on development and design. In the second category, 12.30% (n = 8/65) includes evaluation and comparative articles. These articles are not intensively included in our literature analysis. In the third category, 4.61% (n = 3/65) includes articles about analytical studies. In the fourth category, 3.07% (n = 2/65) comprises reviews and surveys. This study aims to provide researchers with an up-to-date overview of studies that have been conducted on (user/patient) authentication to enhance the security level in telemedicine or any information system. In the current study, taxonomy is presented by explaining previous studies. Moreover, this review highlights the motivations, challenges and recommendations related to finger vein biometric verification systems and determines the gaps in this research direction (protection of finger vein templates in real time), which represent a new research direction in this area.
    Matched MeSH terms: Computer Systems
  2. Al-Ani AK, Anbar M, Manickam S, Al-Ani A
    PLoS One, 2019;14(4):e0214518.
    PMID: 30939154 DOI: 10.1371/journal.pone.0214518
    An efficiently unlimited address space is provided by Internet Protocol version 6 (IPv6). It aims to accommodate thousands of hundreds of unique devices on a similar link. This can be achieved through the Duplicate Address Detection (DAD) process. It is considered one of the core IPv6 network's functions. It is implemented to make sure that IP addresses do not conflict with each other on the same link. However, IPv6 design's functions are exposed to security threats like the DAD process, which is vulnerable to Denial of Service (DoS) attack. Such a threat prevents the host from configuring its IP address by responding to each Neighbor Solicitation (NS) through fake Neighbor Advertisement (NA). Various mechanisms have been proposed to secure the IPv6 DAD procedure. The proposed mechanisms, however, suffer from complexity, high processing time, and the consumption of more resources. The experiments-based findings revealed that all the existing mechanisms had failed to secure the IPv6 DAD process. Therefore, DAD-match security technique is proposed in this study to efficiently secure the DAD process consuming less processing time. DAD-match is built based on SHA-3 to hide the exchange tentative IP among hosts throughout the process of DAD in an IPv6 link-local network. The obtained experimental results demonstrated that the DAD-match security technique achieved less processing time compared with the existing mechanisms as it can resist a range of different threats like collision and brute-force attacks. The findings concluded that the DAD-match technique effectively prevents the DoS attack during the DAD process. The DAD-match technique is implemented on a small area IPv6 network; hence, the author future work is to implement and test the DAD-match technique on a large area IPv6 network.
    Matched MeSH terms: Computer Systems
  3. Kalid N, Zaidan AA, Zaidan BB, Salman OH, Hashim M, Muzammil H
    J Med Syst, 2017 Dec 29;42(2):30.
    PMID: 29288419 DOI: 10.1007/s10916-017-0883-4
    The growing worldwide population has increased the need for technologies, computerised software algorithms and smart devices that can monitor and assist patients anytime and anywhere and thus enable them to lead independent lives. The real-time remote monitoring of patients is an important issue in telemedicine. In the provision of healthcare services, patient prioritisation poses a significant challenge because of the complex decision-making process it involves when patients are considered 'big data'. To our knowledge, no study has highlighted the link between 'big data' characteristics and real-time remote healthcare monitoring in the patient prioritisation process, as well as the inherent challenges involved. Thus, we present comprehensive insights into the elements of big data characteristics according to the six 'Vs': volume, velocity, variety, veracity, value and variability. Each of these elements is presented and connected to a related part in the study of the connection between patient prioritisation and real-time remote healthcare monitoring systems. Then, we determine the weak points and recommend solutions as potential future work. This study makes the following contributions. (1) The link between big data characteristics and real-time remote healthcare monitoring in the patient prioritisation process is described. (2) The open issues and challenges for big data used in the patient prioritisation process are emphasised. (3) As a recommended solution, decision making using multiple criteria, such as vital signs and chief complaints, is utilised to prioritise the big data of patients with chronic diseases on the basis of the most urgent cases.
    Matched MeSH terms: Computer Systems
  4. Albahri OS, Albahri AS, Mohammed KI, Zaidan AA, Zaidan BB, Hashim M, et al.
    J Med Syst, 2018 Mar 22;42(5):80.
    PMID: 29564649 DOI: 10.1007/s10916-018-0943-4
    The new and ground-breaking real-time remote monitoring in triage and priority-based sensor technology used in telemedicine have significantly bounded and dispersed communication components. To examine these technologies and provide researchers with a clear vision of this area, we must first be aware of the utilised approaches and existing limitations in this line of research. To this end, an extensive search was conducted to find articles dealing with (a) telemedicine, (b) triage, (c) priority and (d) sensor; (e) comprehensively review related applications and establish the coherent taxonomy of these articles. ScienceDirect, IEEE Xplore and Web of Science databases were checked for articles on triage and priority-based sensor technology in telemedicine. The retrieved articles were filtered according to the type of telemedicine technology explored. A total of 150 articles were selected and classified into two categories. The first category includes reviews and surveys of triage and priority-based sensor technology in telemedicine. The second category includes articles on the three-tiered architecture of telemedicine. Tier 1 represents the users. Sensors acquire the vital signs of the users and send them to Tier 2, which is the personal gateway that uses local area network protocols or wireless body area network. Medical data are sent from Tier 2 to Tier 3, which is the healthcare provider in medical institutes. Then, the motivation for using triage and priority-based sensor technology in telemedicine, the issues related to the obstruction of its application and the development and utilisation of telemedicine are examined on the basis of the findings presented in the literature.
    Matched MeSH terms: Computer Systems
  5. Reza SM, Ahmad N, Choudhury IA, Ghazilla RA
    Sensors (Basel), 2014 Mar 04;14(3):4342-63.
    PMID: 24599193 DOI: 10.3390/s140304342
    Human motion is a daily and rhythmic activity. The exoskeleton concept is a very positive scientific approach for human rehabilitation in case of lower limb impairment. Although the exoskeleton shows potential, it is not yet applied extensively in clinical rehabilitation. In this research, a fuzzy based control algorithm is proposed for lower limb exoskeletons during sit-to-stand and stand-to-sit movements. Surface electromyograms (EMGs) are acquired from the vastus lateralis muscle using a wearable EMG sensor. The resultant acceleration angle along the z-axis is determined from a kinematics sensor. Twenty volunteers were chosen to perform the experiments. The whole experiment was accomplished in two phases. In the first phase, acceleration angles and EMG data were acquired from the volunteers during both sit-to-stand and stand-to-sit motions. During sit-to-stand movements, the average acceleration angle at activation was 11°-48° and the EMG varied from -0.19 mV to +0.19 mV. On the other hand, during stand-to-sit movements, the average acceleration angle was found to be 57.5°-108° at the activation point and the EMG varied from -0.32 mV to +0.32 mV. In the second phase, a fuzzy controller was designed from the experimental data. The controller was tested and validated with both offline and real time data using LabVIEW.
    Matched MeSH terms: Computer Systems
  6. Halmi MI, Jirangon H, Johari WL, Rachman AR, Shukor MY, Syed MA
    ScientificWorldJournal, 2014;2014:834202.
    PMID: 24977231 DOI: 10.1155/2014/834202
    Luminescence-based assays for toxicants such as Microtox, ToxAlert, and Biotox have been used extensively worldwide. However, the use of these assays in near real time conditions is limited due to nonoptimal assay temperature for the tropical climate. An isolate that exhibits a high luminescence activity in a broad range of temperatures was successfully isolated from the mackerel, Rastrelliger kanagurta. This isolate was tentatively identified as Photobacterium sp. strain MIE, based on partial 16S rDNA molecular phylogeny. Optimum conditions that support high bioluminescence activity occurred between 24 and 30°C, with pH 5.5 to 7.5, 10 to 20 g/L of sodium chloride, 30 to 50 g/L of tryptone, and 4 g/L of glycerol as the carbon source. Assessment of near real time capability of this bacterial system, Xenoassay light to monitor heavy metals from a contaminated river running through the Juru River Basin shows near real time capability with assaying time of less than 30 minutes per samples. Samples returned to the lab were tested with a standard Microtox assay using Vibrio fishceri. Similar results were obtained to Xenoassay light that show temporal variation of copper concentration. Thus, this strain is suitable for near real time river monitoring of toxicants especially in the tropics.
    Matched MeSH terms: Computer Systems
  7. Al-batah MS, Isa NA, Klaib MF, Al-Betar MA
    Comput Math Methods Med, 2014;2014:181245.
    PMID: 24707316 DOI: 10.1155/2014/181245
    To date, cancer of uterine cervix is still a leading cause of cancer-related deaths in women worldwide. The current methods (i.e., Pap smear and liquid-based cytology (LBC)) to screen for cervical cancer are time-consuming and dependent on the skill of the cytopathologist and thus are rather subjective. Therefore, this paper presents an intelligent computer vision system to assist pathologists in overcoming these problems and, consequently, produce more accurate results. The developed system consists of two stages. In the first stage, the automatic features extraction (AFE) algorithm is performed. In the second stage, a neuro-fuzzy model called multiple adaptive neuro-fuzzy inference system (MANFIS) is proposed for recognition process. The MANFIS contains a set of ANFIS models which are arranged in parallel combination to produce a model with multi-input-multioutput structure. The system is capable of classifying cervical cell image into three groups, namely, normal, low-grade squamous intraepithelial lesion (LSIL) and high-grade squamous intraepithelial lesion (HSIL). The experimental results prove the capability of the AFE algorithm to be as effective as the manual extraction by human experts, while the proposed MANFIS produces a good classification performance with 94.2% accuracy.
    Matched MeSH terms: Computer Systems
  8. Maherally Z, Fillmore HL, Tan SL, Tan SF, Jassam SA, Quack FI, et al.
    FASEB J, 2018 01;32(1):168-182.
    PMID: 28883042 DOI: 10.1096/fj.201700162R
    The blood-brain barrier (BBB) consists of endothelial cells, astrocytes, and pericytes embedded in basal lamina (BL). Most in vitro models use nonhuman, monolayer cultures for therapeutic-delivery studies, relying on transendothelial electrical resistance (TEER) measurements without other tight-junction (TJ) formation parameters. We aimed to develop reliable, reproducible, in vitro 3-dimensional (3D) models incorporating relevant human, in vivo cell types and BL proteins. The 3D BBB models were constructed with human brain endothelial cells, human astrocytes, and human brain pericytes in mono-, co-, and tricultures. TEER was measured in 3D models using a volt/ohmmeter and cellZscope. Influence of BL proteins-laminin, fibronectin, collagen type IV, agrin, and perlecan-on adhesion and TEER was assessed using an electric cell-substrate impedance-sensing system. TJ protein expression was assessed by Western blotting (WB) and immunocytochemistry (ICC). Perlecan (10 µg/ml) evoked unreportedly high, in vitro TEER values (1200 Ω) and the strongest adhesion. Coculturing endothelial cells with astrocytes yielded the greatest resistance over time. ICC and WB results correlated with resistance levels, with evidence of prominent occludin expression in cocultures. BL proteins exerted differential effects on TEER, whereas astrocytes in contact yielded higher TEER values and TJ expression.-Maherally, Z., Fillmore, H. L., Tan, S. L., Tan, S. F., Jassam, S. A., Quack, F. I., Hatherell, K. E., Pilkington, G. J. Real-time acquisition of transendothelial electrical resistance in an all-human, in vitro, 3-dimensional, blood-brain barrier model exemplifies tight-junction integrity.
    Matched MeSH terms: Computer Systems
  9. Ho GJ, Liew SM, Ng CJ, Hisham Shunmugam R, Glasziou P
    PLoS One, 2016;11(12):e0167170.
    PMID: 27935993 DOI: 10.1371/journal.pone.0167170
    BACKGROUND: Physicians are often encouraged to locate answers for their clinical queries via an evidence-based literature search approach. The methods used are often not clearly specified. Inappropriate search strategies, time constraint and contradictory information complicate evidence retrieval.

    AIMS: Our study aimed to develop a search strategy to answer clinical queries among physicians in a primary care setting.

    METHODS: Six clinical questions of different medical conditions seen in primary care were formulated. A series of experimental searches to answer each question was conducted on 3 commonly advocated medical databases. We compared search results from a PICO (patients, intervention, comparison, outcome) framework for questions using different combinations of PICO elements. We also compared outcomes from doing searches using text words, Medical Subject Headings (MeSH), or a combination of both. All searches were documented using screenshots and saved search strategies.

    RESULTS: Answers to all 6 questions using the PICO framework were found. A higher number of systematic reviews were obtained using a 2 PICO element search compared to a 4 element search. A more optimal choice of search is a combination of both text words and MeSH terms. Despite searching using the Systematic Review filter, many non-systematic reviews or narrative reviews were found in PubMed. There was poor overlap between outcomes of searches using different databases. The duration of search and screening for the 6 questions ranged from 1 to 4 hours.

    CONCLUSION: This strategy has been shown to be feasible and can provide evidence to doctors' clinical questions. It has the potential to be incorporated into an interventional study to determine the impact of an online evidence retrieval system.

    Matched MeSH terms: Computer Systems
Related Terms
Filters
Contact Us

Please provide feedback to Administrator (afdal@afpm.org.my)

External Links