Displaying all 12 publications

Abstract:
Sort:
  1. Abbasi M, Bin Abd Latiff MS, Chizari H
    ScientificWorldJournal, 2014;2014:839486.
    PMID: 24693247 DOI: 10.1155/2014/839486
    Wireless sensor networks (WSNs) include sensor nodes in which each node is able to monitor the physical area and send collected information to the base station for further analysis. The important key of WSNs is detection and coverage of target area which is provided by random deployment. This paper reviews and addresses various area detection and coverage problems in sensor network. This paper organizes many scenarios for applying sensor node movement for improving network coverage based on bioinspired evolutionary algorithm and explains the concern and objective of controlling sensor node coverage. We discuss area coverage and target detection model by evolutionary algorithm.
    Matched MeSH terms: Remote Sensing Technology/methods*
  2. Islam MJ, Reza AW, Kausar AS, Ramiah H
    ScientificWorldJournal, 2014;2014:306270.
    PMID: 25133220 DOI: 10.1155/2014/306270
    The advent of technology with the increasing use of wireless network has led to the development of Wireless Body Area Network (WBAN) to continuously monitor the change of physiological data in a cost efficient manner. As numerous researches on wave propagation characterization have been done in intrabody communication, this study has given emphasis on the wave propagation characterization between the control units (CUs) and wireless access point (AP) in a hospital scenario. Ray tracing is a tool to predict the rays to characterize the wave propagation. It takes huge simulation time, especially when multiple transmitters are involved to transmit physiological data in a realistic hospital environment. Therefore, this study has developed an accelerated ray tracing method based on the nearest neighbor cell and prior knowledge of intersection techniques. Beside this, Red-Black tree is used to store and provide a faster retrieval mechanism of objects in the hospital environment. To prove the superiority, detailed complexity analysis and calculations of reflection and transmission coefficients are also presented in this paper. The results show that the proposed method is about 1.51, 2.1, and 2.9 times faster than the Object Distribution Technique (ODT), Space Volumetric Partitioning (SVP), and Angular Z-Buffer (AZB) methods, respectively. To show the various effects on received power in 60 GHz frequency, few comparisons are made and it is found that on average -9.44 dBm, -8.23 dBm, and -9.27 dBm received power attenuations should be considered when human, AP, and CU move in a given hospital scenario.
    Matched MeSH terms: Remote Sensing Technology/methods*
  3. Lioe de X, Shafie S, Ramiah H, Tan GH
    ScientificWorldJournal, 2014;2014:923893.
    PMID: 25133266 DOI: 10.1155/2014/923893
    This work presents the design of a low power upconversion mixer adapted in medical remote sensing such as wireless endoscopy application. The proposed upconversion mixer operates in ISM band of 433 MHz. With the carrier power of -5 dBm, the proposed mixer has an output inferred 1 dB compression point of -0.5 dBm with a corresponding output third-order intercept point (OIP3) of 7.1 dBm. The design of the upconversion mixer is realized on CMOS 0.13 μm platform, with a current consumption of 594 μA at supply voltage headroom of 1.2 V.
    Matched MeSH terms: Remote Sensing Technology/methods
  4. Tan KC, Lim HS, Matjafri MZ, Abdullah K
    Environ Monit Assess, 2012 Jun;184(6):3813-29.
    PMID: 21755424 DOI: 10.1007/s10661-011-2226-0
    Atmospheric corrections for multi-temporal optical satellite images are necessary, especially in change detection analyses, such as normalized difference vegetation index (NDVI) rationing. Abrupt change detection analysis using remote-sensing techniques requires radiometric congruity and atmospheric correction to monitor terrestrial surfaces over time. Two atmospheric correction methods were used for this study: relative radiometric normalization and the simplified method for atmospheric correction (SMAC) in the solar spectrum. A multi-temporal data set consisting of two sets of Landsat images from the period between 1991 and 2002 of Penang Island, Malaysia, was used to compare NDVI maps, which were generated using the proposed atmospheric correction methods. Land surface temperature (LST) was retrieved using ATCOR3_T in PCI Geomatica 10.1 image processing software. Linear regression analysis was utilized to analyze the relationship between NDVI and LST. This study reveals that both of the proposed atmospheric correction methods yielded high accuracy through examination of the linear correlation coefficients. To check for the accuracy of the equation obtained through linear regression analysis for every single satellite image, 20 points were randomly chosen. The results showed that the SMAC method yielded a constant value (in terms of error) to predict the NDVI value from linear regression analysis-derived equation. The errors (average) from both proposed atmospheric correction methods were less than 10%.
    Matched MeSH terms: Remote Sensing Technology/methods*
  5. Shuwandy ML, Zaidan BB, Zaidan AA, Albahri AS
    J Med Syst, 2019 Jan 06;43(2):33.
    PMID: 30612191 DOI: 10.1007/s10916-018-1149-5
    The new and groundbreaking real-time remote healthcare monitoring system on sensor-based mobile health (mHealth) authentication in telemedicine has considerably bounded and dispersed communication components. mHealth, an attractive part in telemedicine architecture, plays an imperative role in patient security and privacy and adapts different sensing technologies through many built-in sensors. This study aims to improve sensor-based defence and attack mechanisms to ensure patient privacy in client side when using mHealth. Thus, a multilayer taxonomy was conducted to attain the goal of this study. Within the first layer, real-time remote monitoring studies based on sensor technology for telemedicine application were reviewed and analysed to examine these technologies and provide researchers with a clear vision of security- and privacy-based sensors in the telemedicine area. An extensive search was conducted to find articles about security and privacy issues, review related applications comprehensively and establish the coherent taxonomy of these articles. ScienceDirect, IEEE Xplore and Web of Science databases were investigated for articles on mHealth in telemedicine-based sensor. A total of 3064 papers were collected from 2007 to 2017. The retrieved articles were filtered according to the security and privacy of sensor-based telemedicine applications. A total of 19 articles were selected and classified into two categories. The first category, 57.89% (n = 11/19), included survey on telemedicine articles and their applications. The second category, 42.1% (n = 8/19), included articles contributed to the three-tiered architecture of telemedicine. The collected studies improved the essential need to add another taxonomy layer and review the sensor-based smartphone authentication studies. This map matching for both taxonomies was developed for this study to investigate sensor field comprehensively and gain access to novel risks and benefits of the mHealth security in telemedicine application. The literature on sensor-based smartphones in the second layer of our taxonomy was analysed and reviewed. A total of 599 papers were collected from 2007 to 2017. In this layer, we obtained a final set of 81 articles classified into three categories. The first category of the articles [86.41% (n = 70/81)], where sensor-based smartphones were examined by utilising orientation sensors for user authentication, was used. The second category [7.40% (n = 6/81)] included attack articles, which were not intensively included in our literature analysis. The third category [8.64% (n = 7/81)] included 'other' articles. Factors were considered to understand fully the various contextual aspects of the field in published studies. The characteristics included the motivation and challenges related to sensor-based authentication of smartphones encountered by researchers and the recommendations to strengthen this critical area of research. Finally, many studies on the sensor-based smartphone in the second layer have focused on enhancing accurate authentication because sensor-based smartphones require sensors that could authentically secure mHealth.
    Matched MeSH terms: Remote Sensing Technology/methods*
  6. Jumail A, Liew TS, Salgado-Lynn M, Fornace KM, Stark DJ
    Primates, 2021 Jan;62(1):143-151.
    PMID: 32572697 DOI: 10.1007/s10329-020-00837-y
    A number of primate census techniques have been developed over the past half-century, each of which have advantages and disadvantages in terms of resources required by researchers (e.g., time and costs), availability of technologies, and effectiveness in different habitat types. This study aims to explore the effectiveness of a thermal imaging technique to estimate the group size of different primate species populations in a degraded riparian forest in the Lower Kinabatangan Wildlife Sanctuary (LKWS), Sabah. We compared this survey technique to the conventional visual counting method along the riverbank. For 38 days, a total of 138 primate groups were observed by thermal camera and visually throughout the study. Optimal conditions for the thermal camera were clear weather, not more than 100 m distance from the observer to the targeted area, boat speed ranging between 5 and 12 km/h, and early morning between 04:30 and 05:30 am. The limitations of the thermal cameras include the inability to identify individual species, sexes, age classes, and also to discern between animals closely aggregated (i.e., mothers with attached infants). Despite these limitations with the thermal camera technique, 1.78 times more primates were detected than counting by eye (p 
    Matched MeSH terms: Remote Sensing Technology/methods
  7. Masud F, Abdullah AH, Abdul-Salaam G
    PLoS One, 2019;14(12):e0225518.
    PMID: 31790457 DOI: 10.1371/journal.pone.0225518
    This paper proposes an emergency Traffic Adaptive MAC (eTA-MAC) protocol for WBANs based on Prioritization. The main advantage of the protocol is to provide traffic ranking through a Traffic Class Prioritization-based slotted-Carrier Sense Multiple Access/Collision Avoidance (TCP-CSMA/CA) scheme. The emergency traffic is handled through Emergency Traffic Class Provisioning-based slotted-CSMA/CA (ETCP-CSMA/CA) scheme. The emergency-based traffic adaptivity is provided through Emergency-based Traffic Adaptive slotted-CSMA/CA (ETA-CSMA/CA) scheme. The TCP-CSMA/CA scheme assigns a distinct, minimized and prioritized backoff period range to each traffic class in every backoff during channel access in Contention Access Period (CAP). The ETCP-CSMA/CA scheme delivers the sporadic emergency traffic that occurs at a single or multiple BMSN(s) instantaneously, with minimum delay and packet loss. It does this while being aware of normal traffic in the CAP. Then, the ETA-CSMA/CA scheme creates a balance between throughput and energy in the sporadic emergency situation with energy preservation of normal traffic BMSNs. The proposed protocol is evaluated using NS-2 simulator. The results indicate that the proposed protocol is better than the existing Medium Access Control (MAC) protocols by 86% decrease in packet delivery delay, 61% increase in throughput, and a 76% decrease in energy consumption.
    Matched MeSH terms: Remote Sensing Technology/methods*
  8. Parthiban N, Esterman A, Mahajan R, Twomey DJ, Pathak RK, Lau DH, et al.
    J Am Coll Cardiol, 2015 Jun 23;65(24):2591-2600.
    PMID: 25983009 DOI: 10.1016/j.jacc.2015.04.029
    BACKGROUND: Remote monitoring (RM) of implantable cardioverter-defibrillators (ICD) is an established technology integrated into clinical practice. One recent randomized controlled trial (RCT) and several large device database studies have demonstrated a powerful survival advantage for ICD patients undergoing RM compared with those receiving conventional in-office (IO) follow-up.

    OBJECTIVES: This study sought to conduct a systematic published data review and meta-analysis of RCTs comparing RM with IO follow-up.

    METHODS: Electronic databases and reference lists were searched for RCTs reporting clinical outcomes in ICD patients who did or did not undergo RM. Data were extracted from 9 RCTs, including 6,469 patients, 3,496 of whom were randomized to RM and 2,973 to IO follow-up.

    RESULTS: In the RCT setting, RM demonstrated clinical outcomes comparable with office follow-up in terms of all-cause mortality (odds ratio [OR]: 0.83; p = 0.285), cardiovascular mortality (OR: 0.66; p = 0.103), and hospitalization (OR: 0.83; p = 0.196). However, a reduction in all-cause mortality was noted in the 3 trials using home monitoring (OR: 0.65; p = 0.021) with daily verification of transmission. Although the odds of receiving any ICD shock were similar in RM and IO patients (OR: 1.05; p = 0.86), the odds of inappropriate shock were reduced in RM patients (OR: 0.55; p = 0.002).

    CONCLUSIONS: Meta-analysis of RCTs demonstrates that RM and IO follow-up showed comparable overall outcomes related to patient safety and survival, with a potential survival benefit in RCTs using daily transmission verification. RM benefits include more rapid clinical event detection and a reduction in inappropriate shocks.

    Matched MeSH terms: Remote Sensing Technology/methods*
  9. Talal M, Zaidan AA, Zaidan BB, Albahri AS, Alamoodi AH, Albahri OS, et al.
    J Med Syst, 2019 Jan 15;43(3):42.
    PMID: 30648217 DOI: 10.1007/s10916-019-1158-z
    The Internet of Things (IoT) has been identified in various applications across different domains, such as in the healthcare sector. IoT has also been recognised for its revolution in reshaping modern healthcare with aspiring wide range prospects, including economical, technological and social. This study aims to establish IoT-based smart home security solutions for real-time health monitoring technologies in telemedicine architecture. A multilayer taxonomy is driven and conducted in this study. In the first layer, a comprehensive analysis on telemedicine, which focuses on the client and server sides, shows that other studies associated with IoT-based smart home applications have several limitations that remain unaddressed. Particularly, remote patient monitoring in healthcare applications presents various facilities and benefits by adopting IoT-based smart home technologies without compromising the security requirements and potentially large number of risks. An extensive search is conducted to identify articles that handle these issues, related applications are comprehensively reviewed and a coherent taxonomy for these articles is established. A total number of (n = 3064) are gathered between 2007 and 2017 for most reliable databases, such as ScienceDirect, Web of Science and Institute of Electrical and Electronic Engineer Xplore databases. Then, the articles based on IoT studies that are associated with telemedicine applications are filtered. Nine articles are selected and classified into two categories. The first category, which accounts for 22.22% (n = 2/9), includes surveys on telemedicine articles and their applications. The second category, which accounts for 77.78% (n = 7/9), includes articles on the client and server sides of telemedicine architecture. The collected studies reveal the essential requirement in constructing another taxonomy layer and review IoT-based smart home security studies. Therefore, IoT-based smart home security features are introduced and analysed in the second layer. The security of smart home design based on IoT applications is an aspect that represents a crucial matter for general occupants of smart homes, in which studies are required to provide a better solution with patient security, privacy protection and security of users' entities from being stolen or compromised. Innovative technologies have dispersed limitations related to this matter. The existing gaps and trends in this area should be investigated to provide valuable visions for technical environments and researchers. Thus, 67 articles are obtained in the second layer of our taxonomy and are classified into six categories. In the first category, 25.37% (n = 17/67) of the articles focus on architecture design. In the second category, 17.91% (n = 12/67) includes security analysis articles that investigate the research status in the security area of IoT-based smart home applications. In the third category, 10.44% (n = 7/67) includes articles about security schemes. In the fourth category, 17.91% (n = 12/67) comprises security examination. In the fifth category, 13.43% (n = 9/67) analyses security protocols. In the final category, 14.92% (n = 10/67) analyses the security framework. Then, the identified basic characteristics of this emerging field are presented and provided in the following aspects. Open challenges experienced on the development of IoT-based smart home security are addressed to be adopted fully in telemedicine applications. Then, the requirements are provided to increase researcher's interest in this study area. On this basis, a number of recommendations for different parties are described to provide insights on the next steps that should be considered to enhance the security of smart homes based on IoT. A map matching for both taxonomies is developed in this study to determine the novel risks and benefits of IoT-based smart home security for real-time remote health monitoring within client and server sides in telemedicine applications.
    Matched MeSH terms: Remote Sensing Technology/methods*
  10. Mohsin AH, Zaidan AA, Zaidan BB, Albahri AS, Albahri OS, Alsalem MA, et al.
    J Med Syst, 2018 Oct 16;42(12):238.
    PMID: 30327939 DOI: 10.1007/s10916-018-1104-5
    The development of wireless body area sensor networks is imperative for modern telemedicine. However, attackers and cybercriminals are gradually becoming aware in attacking telemedicine systems, and the black market value of protected health information has the highest price nowadays. Security remains a formidable challenge to be resolved. Intelligent home environments make up one of the major application areas of pervasive computing. Security and privacy are the two most important issues in the remote monitoring and control of intelligent home environments for clients and servers in telemedicine architecture. The personal authentication approach that uses the finger vein pattern is a newly investigated biometric technique. This type of biometric has many advantages over other types (explained in detail later on) and is suitable for different human categories and ages. This study aims to establish a secure verification method for real-time monitoring systems to be used for the authentication of patients and other members who are working in telemedicine systems. The process begins with the sensor based on Tiers 1 and 2 (client side) in the telemedicine architecture and ends with patient verification in Tier 3 (server side) via finger vein biometric technology to ensure patient security on both sides. Multilayer taxonomy is conducted in this research to attain the study's goal. In the first layer, real-time remote monitoring studies based on the sensor technology used in telemedicine applications are reviewed and analysed to provide researchers a clear vision of security and privacy based on sensors in telemedicine. An extensive search is conducted to identify articles that deal with security and privacy issues, related applications are reviewed comprehensively and a coherent taxonomy of these articles is established. ScienceDirect, IEEE Xplore and Web of Science databases are checked for articles on mHealth in telemedicine based on sensors. A total of 3064 papers are collected from 2007 to 2017. The retrieved articles are filtered according to the security and privacy of telemedicine applications based on sensors. Nineteen articles are selected and classified into two categories. The first category, which accounts for 57.89% (n = 11/19), includes surveys on telemedicine articles and their applications. The second category, accounting for 42.1% (n = 8/19), includes articles on the three-tiered architecture of telemedicine. The collected studies reveal the essential need to construct another taxonomy layer and review studies on finger vein biometric verification systems. This map-matching for both taxonomies is developed for this study to go deeply into the sensor field and determine novel risks and benefits for patient security and privacy on client and server sides in telemedicine applications. In the second layer of our taxonomy, the literature on finger vein biometric verification systems is analysed and reviewed. In this layer, we obtain a final set of 65 articles classified into four categories. In the first category, 80% (n = 52/65) of the articles focus on development and design. In the second category, 12.30% (n = 8/65) includes evaluation and comparative articles. These articles are not intensively included in our literature analysis. In the third category, 4.61% (n = 3/65) includes articles about analytical studies. In the fourth category, 3.07% (n = 2/65) comprises reviews and surveys. This study aims to provide researchers with an up-to-date overview of studies that have been conducted on (user/patient) authentication to enhance the security level in telemedicine or any information system. In the current study, taxonomy is presented by explaining previous studies. Moreover, this review highlights the motivations, challenges and recommendations related to finger vein biometric verification systems and determines the gaps in this research direction (protection of finger vein templates in real time), which represent a new research direction in this area.
    Matched MeSH terms: Remote Sensing Technology/methods*
  11. Albahri OS, Albahri AS, Mohammed KI, Zaidan AA, Zaidan BB, Hashim M, et al.
    J Med Syst, 2018 Mar 22;42(5):80.
    PMID: 29564649 DOI: 10.1007/s10916-018-0943-4
    The new and ground-breaking real-time remote monitoring in triage and priority-based sensor technology used in telemedicine have significantly bounded and dispersed communication components. To examine these technologies and provide researchers with a clear vision of this area, we must first be aware of the utilised approaches and existing limitations in this line of research. To this end, an extensive search was conducted to find articles dealing with (a) telemedicine, (b) triage, (c) priority and (d) sensor; (e) comprehensively review related applications and establish the coherent taxonomy of these articles. ScienceDirect, IEEE Xplore and Web of Science databases were checked for articles on triage and priority-based sensor technology in telemedicine. The retrieved articles were filtered according to the type of telemedicine technology explored. A total of 150 articles were selected and classified into two categories. The first category includes reviews and surveys of triage and priority-based sensor technology in telemedicine. The second category includes articles on the three-tiered architecture of telemedicine. Tier 1 represents the users. Sensors acquire the vital signs of the users and send them to Tier 2, which is the personal gateway that uses local area network protocols or wireless body area network. Medical data are sent from Tier 2 to Tier 3, which is the healthcare provider in medical institutes. Then, the motivation for using triage and priority-based sensor technology in telemedicine, the issues related to the obstruction of its application and the development and utilisation of telemedicine are examined on the basis of the findings presented in the literature.
    Matched MeSH terms: Remote Sensing Technology/methods*
  12. Husin NA, Khairunniza-Bejo S, Abdullah AF, Kassim MSM, Ahmad D, Azmi ANN
    Sci Rep, 2020 04 15;10(1):6464.
    PMID: 32296108 DOI: 10.1038/s41598-020-62275-6
    Ground-based LiDAR also known as Terrestrial Laser Scanning (TLS) technology is an active remote sensing imaging method said to be one of the latest advances and innovations for plant phenotyping. Basal Stem Rot (BSR) is the most destructive disease of oil palm in Malaysia that is caused by white-rot fungus Ganoderma boninense, the symptoms of which include flattening and hanging-down of the canopy, shorter leaves, wilting green fronds and smaller crown size. Therefore, until now there is no critical investigation on the characterisation of canopy architecture related to this disease using TLS method was carried out. This study proposed a novel technique of BSR classification at the oil palm canopy analysis using the point clouds data taken from the TLS. A total of 40 samples of oil palm trees at the age of nine-years-old were selected and 10 trees for each health level were randomly taken from the same plot. The trees were categorised into four health levels - T0, T1, T2 and T3, which represents the healthy, mildly infected, moderately infected and severely infected, respectively. The TLS scanner was mounted at a height of 1 m and each palm was scanned at four scan positions around the tree to get a full 3D image. Five parameters were analysed: S200 (canopy strata at 200 cm from the top), S850 (canopy strata at 850 cm from the top), crown pixel (number of pixels inside the crown), frond angle (degree of angle between fronds) and frond number. The results taken from statistical analysis revealed that frond number was the best single parameter to detect BSR disease as early as T1. In classification models, a linear model with a combination of parameters, ABD - A (frond number), B (frond angle) and D (S200), delivered the highest average accuracy for classification of healthy-unhealthy trees with an accuracy of 86.67 per cent. It also can classify the four severity levels of infection with an accuracy of 80 per cent. This model performed better when compared to the severity classification using frond number. The novelty of this research is therefore on the development of new approach to detect and classify BSR using point clouds data of TLS.
    Matched MeSH terms: Remote Sensing Technology/methods*
Filters
Contact Us

Please provide feedback to Administrator (afdal@afpm.org.my)

External Links