Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (13)
  • Open Access

    ARTICLE

    Real-Time Remote-Mentored Echocardiography in Management of Newborns with Critical Congenital Heart Defects

    Håvard Bjerkeseth Solvin1,2,5,*, Simone Goa Diab1,4, Ole Jakob Elle2,3, Henrik Holmstrøm1,4, Henrik Brun2,4,*

    Congenital Heart Disease, Vol.18, No.5, pp. 551-559, 2023, DOI:10.32604/chd.2023.031537 - 10 November 2023

    Abstract Background: The management of suspected critical congenital heart defects (CCHD) relies on timely echocardiographic diagnosis. The availability of experienced echocardiographers is limited or even non-existent in many hospitals with obstetric units. This study evaluates remote-mentored echocardiography performed by physicians without experience in imaging of congenital heart defects (CHD). Methods: The setup included a pediatric cardiologist in a separate room, guiding a physician without experience in echocardiographic imaging of CHD in the examination of a symptomatic newborn. This remote-mentoring pair was blinded to the diagnosis of the newborn and presented with a simplified patient history. The echocardiographic… More > Graphic Abstract

    Real-Time Remote-Mentored Echocardiography in Management of Newborns with Critical Congenital Heart Defects

  • Open Access

    ARTICLE

    Intelligent Networked Control of Vasoactive Drug Infusion for Patients with Uncertain Sensitivity

    Mohamed Esmail Karar1,2,*, Amged Sayed A. Mahmoud2,3

    Computer Systems Science and Engineering, Vol.47, No.1, pp. 721-739, 2023, DOI:10.32604/csse.2023.039235 - 26 May 2023

    Abstract Abnormal high blood pressure or hypertension is still the leading risk factor for death and disability worldwide. This paper presents a new intelligent networked control of medical drug infusion system to regulate the mean arterial blood pressure for hypertensive patients with different health status conditions. The infusion of vasoactive drugs to patients endures various issues, such as variation of sensitivity and noise, which require effective and powerful systems to ensure robustness and good performance. The developed intelligent networked system is composed of a hybrid control scheme of interval type-2 fuzzy (IT2F) logic and teaching-learning-based optimization… More >

  • Open Access

    ARTICLE

    Energy-efficient and Secure Wireless Communication for Telemedicine in IoT

    Shital Joshi1, S. Manimurugan2,3, Ahamed Aljuhani2,*, Umar Albalawi2, Amer Aljaedi2

    Computer Systems Science and Engineering, Vol.43, No.3, pp. 1111-1130, 2022, DOI:10.32604/csse.2022.024802 - 09 May 2022

    Abstract The Internet of Things (IoT) represents a radical shifting paradigm for technological innovations as it can play critical roles in cyberspace applications in various sectors, such as security, monitoring, medical, and environmental sectors, and also in control and industrial applications. The IoT in E-medicine unleashed the design space for new technologies to give instant treatment to patients while also monitoring and tracking health conditions. This research presents a system-level architecture approach for IoT energy efficiency and security. The proposed architecture includes functional components that provide privacy management and system security. Components in the security function… More >

  • Open Access

    ARTICLE

    Robust Reversible Audio Watermarking Scheme for Telemedicine and Privacy Protection

    Xiaorui Zhang1,2,*, Xun Sun1, Xingming Sun1, Wei Sun3, Sunil Kumar Jha4

    CMC-Computers, Materials & Continua, Vol.71, No.2, pp. 3035-3050, 2022, DOI:10.32604/cmc.2022.022304 - 07 December 2021

    Abstract The leakage of medical audio data in telemedicine seriously violates the privacy of patients. In order to avoid the leakage of patient information in telemedicine, a two-stage reversible robust audio watermarking algorithm is proposed to protect medical audio data. The scheme decomposes the medical audio into two independent embedding domains, embeds the robust watermark and the reversible watermark into the two domains respectively. In order to ensure the audio quality, the Hurst exponent is used to find a suitable position for watermark embedding. Due to the independence of the two embedding domains, the embedding of… More >

  • Open Access

    ARTICLE

    Developing Secure Healthcare Video Consultations for Corona Virus (COVID-19) Pandemic

    Mohammed A. AlZain1,*, Jehad F. Al-Amri1, Ahmed I. Sallam2, Emad Sami Jaha3, Sultan S. Alshamrani1, Hala S. El-Sayed4, Osama S. Faragallah1

    Intelligent Automation & Soft Computing, Vol.31, No.3, pp. 1627-1640, 2022, DOI:10.32604/iasc.2022.020137 - 09 October 2021

    Abstract Many health networks became increasingly interactive in implementing a consulting approach to telemedicine before the COVID-19 pandemic. To mitigate patient trafficking and reduce the virus exposure in health centers, several GPs, physicians and people in the video were consulted during the pandemic at the start. Video and smartphone consultations will allow well-insulated and high-risk medical practitioners to maintain their patient care security. Video appointments include diabetes, obesity, hypertension, stroke, mental health, chemotherapy and chronic pain. Many urgent diseases, including an emergency triage for the eye, may also be used for online consultations and triages. The… More >

  • Open Access

    ARTICLE

    Artifacts Reduction Using Multi-Scale Feature Attention Network in Compressed Medical Images

    Seonjae Kim, Dongsan Jun*

    CMC-Computers, Materials & Continua, Vol.70, No.2, pp. 3267-3279, 2022, DOI:10.32604/cmc.2022.020651 - 27 September 2021

    Abstract Medical image compression is one of the essential technologies to facilitate real-time medical data transmission in remote healthcare applications. In general, image compression can introduce undesired coding artifacts, such as blocking artifacts and ringing effects. In this paper, we proposed a Multi-Scale Feature Attention Network (MSFAN) with two essential parts, which are multi-scale feature extraction layers and feature attention layers to efficiently remove coding artifacts of compressed medical images. Multi-scale feature extraction layers have four Feature Extraction (FE) blocks. Each FE block consists of five convolution layers and one CA block for weighted skip connection. More >

  • Open Access

    ARTICLE

    Secure Watermarking Scheme for Color DICOM Images in Telemedicine Applications

    Kamred Udham Singh1, Hatem Salem Abu-Hamatta2, Abhishek Kumar3, Achintya Singhal4, Mamoon Rashid5,*, A. K. Bashir6

    CMC-Computers, Materials & Continua, Vol.70, No.2, pp. 2525-2542, 2022, DOI:10.32604/cmc.2022.019302 - 27 September 2021

    Abstract Teleradiology plays a vital role in the medical field, which permits transmitting medical and imaging data over a communication network. It ensures data reliability and provides convenient communication for clinical interpretation and diagnostic purposes. The transmission of this medical data over a network raises the problems of legal, ethical issues, privacy, and copyright authenticity. The copyright protection of medical images is a significant issue in the medical field. Watermarking schemes are used to address these issues. A gray-level or binary image is used as a watermark frequently in color image watermarking schemes. In this paper,… More >

  • Open Access

    ARTICLE

    Visual Protection Using RC5 Selective Encryption in Telemedicine

    Osama S. Faragallah1,*, Ahmed I. Sallam2, Hala S. El-sayed3

    Intelligent Automation & Soft Computing, Vol.31, No.1, pp. 177-190, 2022, DOI:10.32604/iasc.2022.019348 - 03 September 2021

    Abstract The dissemination of the COVID-19 viruses now extends the usage of video consultations to share perspectives and virtual medical consultations, save expenses and health procedures, track the success of care proposals with detail, consistency, and ease from moment to time. The research aims to study the security of video consultations. We will also present the advantages and disadvantages of video consultations and the complications of their implementation. This paper mainly proposes a practical, high-efficiency video encoding technique for the new video encoding technique (HEVC) used in video consultations. The technology offered uses the RC5 block… More >

  • Open Access

    ARTICLE

    Development of a Web-Based Telemedicine System for Covid-19 Patients

    Morshedul Bari Antor1, A. H. M. Shafayet Jamil1, Maliha Mamtaz1, Mohammad Monirujjaman Khan1,*, Sultan S. Alshamrani2, Mehedi Masud3

    Intelligent Automation & Soft Computing, Vol.30, No.3, pp. 899-915, 2021, DOI:10.32604/iasc.2021.018914 - 20 August 2021

    Abstract In the Covid-19 pandemic, people have been very concerned about the safety and are avoiding crowded places like hospitals. An online telemedicine web-based technology can help to overcome this situation. This paper presents an online telemedicine system that helps to promote collaboration between doctors, hospitals, and patients. The system allows doctors to serve patients from remote areas. The system also allows both doctors and patients to communicate through video calls or text messages. Patients using the system can store information about their health, search for doctors, and consult medical professionals using text messages and video More >

  • Open Access

    ARTICLE

    Steganography-Based Transmission of Medical Images Over Unsecure Network for Telemedicine Applications

    Romany F. Mansour1,*, Moheb R. Girgis2

    CMC-Computers, Materials & Continua, Vol.68, No.3, pp. 4069-4085, 2021, DOI:10.32604/cmc.2021.017064 - 06 May 2021

    Abstract Steganography is one of the best techniques to hide secret data. Several steganography methods are available that use an image as a cover object, which is called image steganography. In image steganography, the major features are the cover object quality and hiding data capacity. Due to poor image quality, attackers could easily hack the secret data. Therefore, the hidden data quantity should be improved, while keeping stego-image quality high. The main aim of this study is combining several steganography techniques, for secure transmission of data without leakage and unauthorized access. In this paper, a technique,… More >

Displaying 1-10 on page 1 of 13. Per Page