Displaying all 13 publications

Abstract:
Sort:
  1. Kiah ML, Haiqi A, Zaidan BB, Zaidan AA
    Comput Methods Programs Biomed, 2014 Nov;117(2):360-82.
    PMID: 25070757 DOI: 10.1016/j.cmpb.2014.07.002
    The use of open source software in health informatics is increasingly advocated by authors in the literature. Although there is no clear evidence of the superiority of the current open source applications in the healthcare field, the number of available open source applications online is growing and they are gaining greater prominence. This repertoire of open source options is of a great value for any future-planner interested in adopting an electronic medical/health record system, whether selecting an existent application or building a new one. The following questions arise. How do the available open source options compare to each other with respect to functionality, usability and security? Can an implementer of an open source application find sufficient support both as a user and as a developer, and to what extent? Does the available literature provide adequate answers to such questions? This review attempts to shed some light on these aspects.
  2. Kiah ML, Nabi MS, Zaidan BB, Zaidan AA
    J Med Syst, 2013 Oct;37(5):9971.
    PMID: 24037086 DOI: 10.1007/s10916-013-9971-2
    This study aims to provide security solutions for implementing electronic medical records (EMRs). E-Health organizations could utilize the proposed method and implement recommended solutions in medical/health systems. Majority of the required security features of EMRs were noted. The methods used were tested against each of these security features. In implementing the system, the combination that satisfied all of the security features of EMRs was selected. Secure implementation and management of EMRs facilitate the safeguarding of the confidentiality, integrity, and availability of e-health organization systems. Health practitioners, patients, and visitors can use the information system facilities safely and with confidence anytime and anywhere. After critically reviewing security and data transmission methods, a new hybrid method was proposed to be implemented on EMR systems. This method will enhance the robustness, security, and integration of EMR systems. The hybrid of simple object access protocol/extensible markup language (XML) with advanced encryption standard and secure hash algorithm version 1 has achieved the security requirements of an EMR system with the capability of integrating with other systems through the design of XML messages.
  3. Zaidan BB, Haiqi A, Zaidan AA, Abdulnabi M, Kiah ML, Muzamel H
    J Med Syst, 2015 May;39(5):51.
    PMID: 25732083 DOI: 10.1007/s10916-015-0235-1
    This study focuses on the situation of health information exchange (HIE) in the context of a nationwide network. It aims to create a security framework that can be implemented to ensure the safe transmission of health information across the boundaries of care providers in Malaysia and other countries. First, a critique of the major elements of nationwide health information networks is presented from the perspective of security, along with such topics as the importance of HIE, issues, and main approaches. Second, a systematic evaluation is conducted on the security solutions that can be utilized in the proposed nationwide network. Finally, a secure framework for health information transmission is proposed within a central cloud-based model, which is compatible with the Malaysian telehealth strategy. The outcome of this analysis indicates that a complete security framework for a global structure of HIE is yet to be defined and implemented. Our proposed framework represents such an endeavor and suggests specific techniques to achieve this goal.
  4. Zaidan AA, Zaidan BB, Al-Haiqi A, Kiah ML, Hussain M, Abdulnabi M
    J Biomed Inform, 2015 Feb;53:390-404.
    PMID: 25483886 DOI: 10.1016/j.jbi.2014.11.012
    Evaluating and selecting software packages that meet the requirements of an organization are difficult aspects of software engineering process. Selecting the wrong open-source EMR software package can be costly and may adversely affect business processes and functioning of the organization. This study aims to evaluate and select open-source EMR software packages based on multi-criteria decision-making. A hands-on study was performed and a set of open-source EMR software packages were implemented locally on separate virtual machines to examine the systems more closely. Several measures as evaluation basis were specified, and the systems were selected based a set of metric outcomes using Integrated Analytic Hierarchy Process (AHP) and TOPSIS. The experimental results showed that GNUmed and OpenEMR software can provide better basis on ranking score records than other open-source EMR software packages.
  5. Alanazi HO, Zaidan AA, Zaidan BB, Kiah ML, Al-Bakri SH
    J Med Syst, 2015 Jan;39(1):165.
    PMID: 25481568 DOI: 10.1007/s10916-014-0165-3
    This study has two objectives. First, it aims to develop a system with a highly secured approach to transmitting electronic medical records (EMRs), and second, it aims to identify entities that transmit private patient information without permission. The NTRU and the Advanced Encryption Standard (AES) cryptosystems are secured encryption methods. The AES is a tested technology that has already been utilized in several systems to secure sensitive data. The United States government has been using AES since June 2003 to protect sensitive and essential information. Meanwhile, NTRU protects sensitive data against attacks through the use of quantum computers, which can break the RSA cryptosystem and elliptic curve cryptography algorithms. A hybrid of AES and NTRU is developed in this work to improve EMR security. The proposed hybrid cryptography technique is implemented to secure the data transmission process of EMRs. The proposed security solution can provide protection for over 40 years and is resistant to quantum computers. Moreover, the technique provides the necessary evidence required by law to identify disclosure or misuse of patient records. The proposed solution can effectively secure EMR transmission and protect patient rights. It also identifies the source responsible for disclosing confidential patient records. The proposed hybrid technique for securing data managed by institutional websites must be improved in the future.
  6. Kazemipoor M, Hajifaraji M, Radzi CW, Shamshirband S, Petković D, Mat Kiah ML
    Comput Methods Programs Biomed, 2015 Jan;118(1):69-76.
    PMID: 25453384 DOI: 10.1016/j.cmpb.2014.10.006
    This research examines the precision of an adaptive neuro-fuzzy computing technique in estimating the anti-obesity property of a potent medicinal plant in a clinical dietary intervention. Even though a number of mathematical functions such as SPSS analysis have been proposed for modeling the anti-obesity properties estimation in terms of reduction in body mass index (BMI), body fat percentage, and body weight loss, there are still disadvantages of the models like very demanding in terms of calculation time. Since it is a very crucial problem, in this paper a process was constructed which simulates the anti-obesity activities of caraway (Carum carvi) a traditional medicine on obese women with adaptive neuro-fuzzy inference (ANFIS) method. The ANFIS results are compared with the support vector regression (SVR) results using root-mean-square error (RMSE) and coefficient of determination (R(2)). The experimental results show that an improvement in predictive accuracy and capability of generalization can be achieved by the ANFIS approach. The following statistical characteristics are obtained for BMI loss estimation: RMSE=0.032118 and R(2)=0.9964 in ANFIS testing and RMSE=0.47287 and R(2)=0.361 in SVR testing. For fat loss estimation: RMSE=0.23787 and R(2)=0.8599 in ANFIS testing and RMSE=0.32822 and R(2)=0.7814 in SVR testing. For weight loss estimation: RMSE=0.00000035601 and R(2)=1 in ANFIS testing and RMSE=0.17192 and R(2)=0.6607 in SVR testing. Because of that, it can be applied for practical purposes.
  7. Mat Kiah ML, Al-Bakri SH, Zaidan AA, Zaidan BB, Hussain M
    J Med Syst, 2014 Oct;38(10):133.
    PMID: 25199651 DOI: 10.1007/s10916-014-0133-y
    One of the applications of modern technology in telemedicine is video conferencing. An alternative to traveling to attend a conference or meeting, video conferencing is becoming increasingly popular among hospitals. By using this technology, doctors can help patients who are unable to physically visit hospitals. Video conferencing particularly benefits patients from rural areas, where good doctors are not always available. Telemedicine has proven to be a blessing to patients who have no access to the best treatment. A telemedicine system consists of customized hardware and software at two locations, namely, at the patient's and the doctor's end. In such cases, the video streams of the conferencing parties may contain highly sensitive information. Thus, real-time data security is one of the most important requirements when designing video conferencing systems. This study proposes a secure framework for video conferencing systems and a complete management solution for secure video conferencing groups. Java Media Framework Application Programming Interface classes are used to design and test the proposed secure framework. Real-time Transport Protocol over User Datagram Protocol is used to transmit the encrypted audio and video streams, and RSA and AES algorithms are used to provide the required security services. Results show that the encryption algorithm insignificantly increases the video conferencing computation time.
  8. Kiah ML, Zaidan BB, Zaidan AA, Nabi M, Ibraheem R
    J Med Syst, 2014 Apr;38(4):37.
    PMID: 24700079 DOI: 10.1007/s10916-014-0037-x
    The advancement of information technology has facilitated the automation and feasibility of online information sharing. The second generation of the World Wide Web (Web 2.0) enables the collaboration and sharing of online information through Web-serving applications. Data mashup, which is considered a Web 2.0 platform, plays an important role in information and communication technology applications. However, few ideas have been transformed into education and research domains, particularly in medical informatics. The creation of a friendly environment for medical informatics research requires the removal of certain obstacles in terms of search time, resource credibility, and search result accuracy. This paper considers three glitches that researchers encounter in medical informatics research; these glitches include the quality of papers obtained from scientific search engines (particularly, Web of Science and Science Direct), the quality of articles from the indices of these search engines, and the customizability and flexibility of these search engines. A customizable search engine for trusted resources of medical informatics was developed and implemented through data mashup. Results show that the proposed search engine improves the usability of scientific search engines for medical informatics. Pipe search engine was found to be more efficient than other engines.
  9. Shamshirband S, Hessam S, Javidnia H, Amiribesheli M, Vahdat S, Petković D, et al.
    Int J Med Sci, 2014;11(5):508-14.
    PMID: 24688316 DOI: 10.7150/ijms.8249
    There is a high risk of tuberculosis (TB) disease diagnosis among conventional methods.
  10. Hussain M, Al-Haiqi A, Zaidan AA, Zaidan BB, Kiah ML, Anuar NB, et al.
    Comput Methods Programs Biomed, 2015 Dec;122(3):393-408.
    PMID: 26412009 DOI: 10.1016/j.cmpb.2015.08.015
    To survey researchers' efforts in response to the new and disruptive technology of smartphone medical apps, mapping the research landscape form the literature into a coherent taxonomy, and finding out basic characteristics of this emerging field represented on: motivation of using smartphone apps in medicine and healthcare, open challenges that hinder the utility, and the recommendations to improve the acceptance and use of medical apps in the literature.
  11. Saybani MR, Shamshirband S, Golzari S, Wah TY, Saeed A, Mat Kiah ML, et al.
    Med Biol Eng Comput, 2016 Mar;54(2-3):385-99.
    PMID: 26081904 DOI: 10.1007/s11517-015-1323-6
    Tuberculosis is a major global health problem that has been ranked as the second leading cause of death from an infectious disease worldwide, after the human immunodeficiency virus. Diagnosis based on cultured specimens is the reference standard; however, results take weeks to obtain. Slow and insensitive diagnostic methods hampered the global control of tuberculosis, and scientists are looking for early detection strategies, which remain the foundation of tuberculosis control. Consequently, there is a need to develop an expert system that helps medical professionals to accurately diagnose the disease. The objective of this study is to diagnose tuberculosis using a machine learning method. Artificial immune recognition system (AIRS) has been used successfully for diagnosing various diseases. However, little effort has been undertaken to improve its classification accuracy. In order to increase the classification accuracy, this study introduces a new hybrid system that incorporates real tournament selection mechanism into the AIRS. This mechanism is used to control the population size of the model and to overcome the existing selection pressure. Patient epacris reports obtained from the Pasteur laboratory in northern Iran were used as the benchmark data set. The sample consisted of 175 records, from which 114 (65 %) were positive for TB, and the remaining 61 (35 %) were negative. The classification performance was measured through tenfold cross-validation, root-mean-square error, sensitivity, and specificity. With an accuracy of 100 %, RMSE of 0, sensitivity of 100 %, and specificity of 100 %, the proposed method was able to successfully classify tuberculosis cases. In addition, the proposed method is comparable with top classifiers used in this research.
  12. Ahmed Al-Hussein W, Mat Kiah ML, Lip Yee P, Zaidan BB
    PeerJ Comput Sci, 2021;7:e632.
    PMID: 34541305 DOI: 10.7717/peerj-cs.632
    In the plan and development of Intelligent Transportation Systems (ITS), understanding drivers behaviour is considered highly valuable. Reckless driving, incompetent preventive measures, and the reliance on slow and incompetent assistance systems are attributed to the increasing rates of traffic accidents. This survey aims to review and scrutinize the literature related to sensor-based driver behaviour domain and to answer questions that are not covered so far by existing reviews. It covers the factors that are required in improving the understanding of various appropriate characteristics of this domain and outlines the common incentives, open confrontations, and imminent commendations from former researchers. Systematic scanning of the literature, from January 2014 to December 2020, mainly from four main databases, namely, IEEEXplore, ScienceDirect, Scopus and Web of Science to locate highly credible peer-reviewed articles. Amongst the 5,962 articles found, a total of 83 articles are selected based on the author's predefined inclusion and exclusion criteria. Then, a taxonomy of existing literature is presented to recognize the various aspects of this relevant research area. Common issues, motivations, and recommendations of previous studies are identified and discussed. Moreover, substantial analysis is performed to identify gaps and weaknesses in current literature and guide future researchers into planning their experiments appropriately. Finally, future directions are provided for researchers interested in driver profiling and recognition. This survey is expected to aid in emphasizing existing research prospects and create further research directions in the near future.
Related Terms
Filters
Contact Us

Please provide feedback to Administrator (afdal@afpm.org.my)

External Links