Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 15 of 15

Full-Text Articles in Entire DC Network

Unleashing The Power Of Internet Of Things And Blockchain: A Comprehensive Analysis And Future Directions, Abderahman Rejeb, Karim Rejeb, Andrea Appolloni, Sandeep Jagtap, Mohammad Iranmanesh, Salem Alghamdi, Yaser Alhasawi, Yasanur Kayikci Jan 2024

Unleashing The Power Of Internet Of Things And Blockchain: A Comprehensive Analysis And Future Directions, Abderahman Rejeb, Karim Rejeb, Andrea Appolloni, Sandeep Jagtap, Mohammad Iranmanesh, Salem Alghamdi, Yaser Alhasawi, Yasanur Kayikci

Research outputs 2022 to 2026

As the fusion of the Internet of Things (IoT) and blockchain technology advances, it is increasingly shaping diverse fields. The potential of this convergence to fortify security, enhance privacy, and streamline operations has ignited considerable academic interest, resulting in an impressive body of literature. However, there is a noticeable scarcity of studies employing Latent Dirichlet Allocation (LDA) to dissect and categorize this field. This review paper endeavours to bridge this gap by meticulously analysing a dataset of 4455 journal articles drawn solely from the Scopus database, cantered around IoT and blockchain applications. Utilizing LDA, we have extracted 14 distinct topics …


The Internet Of Things (Iot) In Healthcare: Taking Stock And Moving Forward, Abderahman Rejeb, Karim Rejeb, Horst Treiblmaier, Andrea Appolloni, Salem Alghamdi, Yaser Alhasawi, Mohammad Iranmanesh Jul 2023

The Internet Of Things (Iot) In Healthcare: Taking Stock And Moving Forward, Abderahman Rejeb, Karim Rejeb, Horst Treiblmaier, Andrea Appolloni, Salem Alghamdi, Yaser Alhasawi, Mohammad Iranmanesh

Research outputs 2022 to 2026

Recent improvements in the Internet of Things (IoT) have allowed healthcare to evolve rapidly. This article summarizes previous studies on IoT applications in healthcare. A comprehensive review and a bibliometric analysis were performed to objectively summarize the growth of IoT research in healthcare. To begin, 2,990 journal articles were carefully selected for further investigation. These publications were analyzed based on various bibliometric metrics, including publication year, journals, authors, institutions, and countries. Keyword co-occurrence and co-citation networks were generated to unravel significant research hotspots. The findings show that IoT research has received considerable interest from the healthcare community. Based on the …


A Comprehensive Review On Machine Learning In Healthcare Industry: Classification, Restrictions, Opportunities And Challenges, Qi An, Saifur Rahman, Jingwen Zhou, James Jin Kang May 2023

A Comprehensive Review On Machine Learning In Healthcare Industry: Classification, Restrictions, Opportunities And Challenges, Qi An, Saifur Rahman, Jingwen Zhou, James Jin Kang

Research outputs 2022 to 2026

Recently, various sophisticated methods, including machine learning and artificial intelligence, have been employed to examine health-related data. Medical professionals are acquiring enhanced diagnostic and treatment abilities by utilizing machine learning applications in the healthcare domain. Medical data have been used by many researchers to detect diseases and identify patterns. In the current literature, there are very few studies that address machine learning algorithms to improve healthcare data accuracy and efficiency. We examined the effectiveness of machine learning algorithms in improving time series healthcare metrics for heart rate data transmission (accuracy and efficiency). In this paper, we reviewed several machine learning …


Cyber-Aidd: A Novel Approach To Implementing Improved Cyber Security Resilience For Large Australian Healthcare Providers Using A Unified Modelling Language Ontology, Martin Dart, Mohiuddin Ahmed Jan 2023

Cyber-Aidd: A Novel Approach To Implementing Improved Cyber Security Resilience For Large Australian Healthcare Providers Using A Unified Modelling Language Ontology, Martin Dart, Mohiuddin Ahmed

Research outputs 2022 to 2026

Purpose: This paper proposes a novel cyber security risk governance framework and ontology for large Australian healthcare providers, using the structure and simplicity of the Unified Modelling Language (UML). This framework is intended to mitigate impacts from the risk areas of: (1) cyber-attacks, (2) incidents, (3) data breaches, and (4) data disclosures. Methods Using a mixed-methods approach comprised of empirical evidence discovery and phenomenological review, existing literature is sourced to confirm baseline ontological definitions. These are supplemented with Australian government reports, professional standards publications and legislation covering cyber security, data breach reporting and healthcare governance. Historical examples of healthcare cyber …


A Review Of Multi-Factor Authentication In The Internet Of Healthcare Things, Tance Suleski, Mohiuddin Ahmed, Wencheng Yang, Eugene Wang Jan 2023

A Review Of Multi-Factor Authentication In The Internet Of Healthcare Things, Tance Suleski, Mohiuddin Ahmed, Wencheng Yang, Eugene Wang

Research outputs 2022 to 2026

Objective: This review paper aims to evaluate existing solutions in healthcare authentication and provides an insight into the technologies incorporated in Internet of Healthcare Things (IoHT) and multi-factor authentication (MFA) applications for next-generation authentication practices. Our review has two objectives: (a) Review MFA based on the challenges, impact and solutions discussed in the literature; and (b) define the security requirements of the IoHT as an approach to adapting MFA solutions in a healthcare context. Methods: To review the existing literature, we indexed articles from the IEEE Xplore, ACM Digital Library, ScienceDirect, and SpringerLink databases. The search was refined to combinations …


Enhanced Heart Rate Prediction Model Using Damped Least-Squares Algorithm, Angela An, Mohammad Al-Fawa’Reh, James Jin Kang Dec 2022

Enhanced Heart Rate Prediction Model Using Damped Least-Squares Algorithm, Angela An, Mohammad Al-Fawa’Reh, James Jin Kang

Research outputs 2022 to 2026

Monitoring a patient’s vital signs is considered one of the most challenging problems in telehealth systems, especially when patients reside in remote locations. Companies now use IoT devices such as wearable devices to participate in telehealth systems. However, the steady adoption of wearables can result in a significant increase in the volume of data being collected and transmitted. As these devices run on limited battery power, they can run out of power quickly due to the high processing requirements of the device for data collection and transmission. Given the importance of medical data, it is imperative that all transmitted data …


The K-Means Algorithm: A Comprehensive Survey And Performance Evaluation, Mohiuddin Ahmed, Raihan Seraj, Syed Mohammed Shamsul Islam Aug 2020

The K-Means Algorithm: A Comprehensive Survey And Performance Evaluation, Mohiuddin Ahmed, Raihan Seraj, Syed Mohammed Shamsul Islam

Research outputs 2014 to 2021

© 2020 by the authors. Licensee MDPI, Basel, Switzerland. The k-means clustering algorithm is considered one of the most powerful and popular data mining algorithms in the research community. However, despite its popularity, the algorithm has certain limitations, including problems associated with random initialization of the centroids which leads to unexpected convergence. Additionally, such a clustering algorithm requires the number of clusters to be defined beforehand, which is responsible for different cluster shapes and outlier effects. A fundamental problem of the k-means algorithm is its inability to handle various data types. This paper provides a structured and synoptic overview of …


False Image Injection Prevention Using Ichain, Mohiuddin Ahmed Jan 2019

False Image Injection Prevention Using Ichain, Mohiuddin Ahmed

Research outputs 2014 to 2021

The advances in information and communication technology are consistently beneficial for the healthcare sector. A trend in the healthcare sector is the progressive shift in how data are acquired and the storage of such data in different facilities, such as in the cloud, due to the efficiency and effectiveness offered. Digital images related to healthcare are sensitive in nature and require maximum security and privacy. A malicious entity can tamper with such stored digital images to mislead healthcare personnel and the consequences of wrong diagnosis are harmful for both parties. A new type of cyber attack, a false image injection …


Proof-Of-Familiarity: A Privacy-Preserved Blockchain Scheme For Collaborative Medical Decision-Making, Jinhong Yang, Md Mehedi Hassan Hasan Onik, Nam-Yong Lee, Mohiuddin Ahmed, Chul-Soo Kim Jan 2019

Proof-Of-Familiarity: A Privacy-Preserved Blockchain Scheme For Collaborative Medical Decision-Making, Jinhong Yang, Md Mehedi Hassan Hasan Onik, Nam-Yong Lee, Mohiuddin Ahmed, Chul-Soo Kim

Research outputs 2014 to 2021

The current healthcare sector is facing difficulty in satisfying the growing issues, expenses, and heavy regulation of quality treatment. Surely, electronic medical records (EMRs) and protected health information (PHI) are highly sensitive, personally identifiable information (PII). However, the sharing of EMRs, enhances overall treatment quality. A distributed ledger (blockchain) technology, embedded with privacy and security by architecture, provides a transparent application developing platform. Privacy, security, and lack of confidence among stakeholders are the main downsides of extensive medical collaboration. This study, therefore, utilizes the transparency, security, and efficiency of blockchain technology to establish a collaborative medical decision-making scheme. This study …


The Potentials And Challenges Of Big Data In Public Health, Rena N. Vithiatharan Dec 2014

The Potentials And Challenges Of Big Data In Public Health, Rena N. Vithiatharan

Australian eHealth Informatics and Security Conference

The potential to use big data sources for public health increases with the broadening availability of data and improved methods of analysis. Whilst there are some well-known examples of the opportunistic use of big data, such as GoogleFlu, public health has not yet realised the full potential of such data sources. A literature review was undertaken to identify the potential of such data collections to impact public health, and to identify what challenges are currently limiting this potential. The potential include improved real-time analysis, research and development and genome studies. However, challenges listed are poor universal standardisation and classification, privacy …


Byod In Ehealth: Herding Cats And Stable Doors, Or A Catastrophe Waiting To Happen?, Krishnun Sansurooh, Patricia A H Williams Dec 2014

Byod In Ehealth: Herding Cats And Stable Doors, Or A Catastrophe Waiting To Happen?, Krishnun Sansurooh, Patricia A H Williams

Australian eHealth Informatics and Security Conference

The use of personal devices in the work environment has crossed the boundaries of work and socially related tasks. With cyber criminals seriously targeting healthcare for medical identity theft, the lack of control of new technologies within healthcare networks becomes an increasing vulnerability. The prolific adoption of personal mobile devices in the healthcare environment requires a proactive approach to the management of Bring Your Own Device (BYOD). This paper analysed the current state of the problem and the challenges that this creates in an environment that has stringent privacy and security requirements. The discourse demonstrates that the issue is not …


Big Data In Healthcare: What Is It Used For?, Rebecca Hermon, Patricia A H Williams Dec 2014

Big Data In Healthcare: What Is It Used For?, Rebecca Hermon, Patricia A H Williams

Australian eHealth Informatics and Security Conference

Big data analytics is a growth area with the potential to provide useful insight in healthcare. Whilst many dimensions of big data still present issues in its use and adoption, such as managing the volume, variety, velocity, veracity, and value, the accuracy, integrity, and semantic interpretation are of greater concern in clinical application. However, such challenges have not deterred the use and exploration of big data as an evidence source in healthcare. This drives the need to investigate healthcare information to control and reduce the burgeoning cost of healthcare, as well as to seek evidence to improve patient outcomes. Whilst …


A Holistic Approach To Ehealth Security In Australia: Developing A National Ehealth Sercurity And Access Framework (Nesaf), Yvette Lejins, John Leitch Jan 2012

A Holistic Approach To Ehealth Security In Australia: Developing A National Ehealth Sercurity And Access Framework (Nesaf), Yvette Lejins, John Leitch

Research outputs 2012

The Australian ehealth landscape is confronted with new challenges for healthcare providers in appropriately managing and protecting personal health information. The vision of the National eHealth Security and Access Framework (NESAF) is to adopt a consistent approach to the application of health information security standards and provide better practice guidance in relation to eHealth specific security and access practices. The eHealth information security landscape has a number of unique attributes, many that are faced by other business that provide a service or products – but we see that there is no industry in Australia where such widespread changes in the …


A Holistic Approach To Ehealth Security In Australia: Developing A National Ehealth Sercurity And Access Framework (Nesaf), Yvette Lejins, John Leitch Jan 2012

A Holistic Approach To Ehealth Security In Australia: Developing A National Ehealth Sercurity And Access Framework (Nesaf), Yvette Lejins, John Leitch

Australian eHealth Informatics and Security Conference

The Australian ehealth landscape is confronted with new challenges for healthcare providers in appropriately managing and protecting personal health information. The vision of the National eHealth Security and Access Framework (NESAF) is to adopt a consistent approach to the application of health information security standards and provide better practice guidance in relation to eHealth specific security and access practices. The eHealth information security landscape has a number of unique attributes, many that are faced by other business that provide a service or products – but we see that there is no industry in Australia where such widespread changes in the …


The Need For A Security/Privacy Model For The Health Sector In Ghana, James Tetteh Ami-Narh, Patricia A. Williams Dec 2007

The Need For A Security/Privacy Model For The Health Sector In Ghana, James Tetteh Ami-Narh, Patricia A. Williams

Australian Information Security Management Conference

Many developing countries around the world are faced with the dilemma “brain-drain” as their healthcare professionals seek better economic opportunities in other countries. This problem is compounded by a lack of robust healthcare infrastructure requiring substantive improvements to bring them up to date. This impacts a countries ability to understand morbidity and mortality patterns which impact health care policy and program planning. The lack of IT infrastructure also negatively affects the safety, quality, and efficiency of health care delivery in these countries. Ghana is faced with this precise set of circumstances as it struggles to adopt policies to overcome these …