Mohamed Doheir | University Malaysia of Computer Science and Engineering (original) (raw)
Uploads
Papers by Mohamed Doheir
The aim of this paper is to propose the new conceptual cloud computing modelling for improving he... more The aim of this paper is to propose the new conceptual cloud computing modelling for improving healthcare management in health organizations. The new conceptual cloud computing modelling modelling for improving healthcare management includes cloud computing service structures as cloud communications as a service, software as a service, platform as a service, and infrastructure as a service; and deployment models include public cloud, private cloud, hybrid cloud;and resources management in cloud computing like cloud mobility and API management, cloud organization process management, knowledge Administration of cloud systems, and cloud operation and environment management. However, we will determine the critical issues for cloud healthcare management in all components of cloud computing system. After then we will determine cloud solutions and controls to reduce critical issues in healthcare management. All critical issues in cloud computing will classify based on cloud computing manag...
Purpose: Electronic health records (EHRs) exchange improves hospital quality and reduces health c... more Purpose: Electronic health records (EHRs) exchange improves hospital quality and reduces health costs. However, few studies address the antecedent factors of healthcare professionals’ intentions to use EHR system. We examine the factors that effecting on EHRs acceptance by Unified Theory of Acceptance and Use of Technology (UTAUT2) model, this is a new methodology for evaluating acceptance of EHRs. We propose a theoretical model to explain the exercise behavior of health care professionals’ to use an EHR system acceptance. Methods: We conducted a pilot test survey in Jordan hospitals to collect data from healthcare professionals who had experience using the EHR systems. A valid sample of 22 responses from 70 questionnaires were collected for data analysis to pilot test
Advanced Science Letters, 2014
Wireless Sensor Network has become a catchphrase recently starting from agriculture, military sce... more Wireless Sensor Network has become a catchphrase recently starting from agriculture, military scenario, emergency situation, weather monitoring etc. Deployment of sensor network involves addressing a lot of practical issues like limited energy resource of sensor nodes, self-forming and self-healing of automated sensor networks, data fusion and communication capabilities. One of commonly used simulator—i.e., NS2, is a friendly tool that offers a virtual environment, which allows learning about the number of rules governing a sensor network's topologies to carry out various settings and communications' formats or patterns. In NS2 application services, it has been defined on how the sensors nodes perform when they identify a strange phenomenon. A sensor node may be sending a massage to a main station if it continues to identify that phenomenon. This paper proposes an enhancement method for this network simulator as a framework applicable to such called self-configured network, ...
Personal Health Records (PHRs) can be considered as one of the most important health technologies... more Personal Health Records (PHRs) can be considered as one of the most important health technologies. PHRs enroll the patients directly to their health decision making through giving them the authority to control and share their health information. Testing the user acceptance toward new technology is a vital process. Over the previous decades many models have been used and the latest one was UTAUT2. UTAUT2 have been widely used in e-business and gaming user acceptance researches, whereas, it has been rarely used in health field. This study proposes a combination of UTAUT2 and PMT in order to investigate the user acceptance of PHRs. Relevant factors may be added at the literature review stage. The final model will be used as a framework to investigate the user acceptance of PHRs in Malaysia.
Advanced Science Letters, 2015
International Journal of Advanced Science and Technology, 2015
Advanced Science Letters, 2014
ABSTRACT Wireless Sensor Network has become a catchphrase recently starting from agriculture, mil... more ABSTRACT Wireless Sensor Network has become a catchphrase recently starting from agriculture, military scenario, emergency situation, weather monitoring etc. Deployment of sensor network involves addressing a lot of practical issues like limited energy resource of sensor nodes, self-forming and self-healing of automated sensor networks, data fusion and communication capabilities. One of commonly used simulator—i.e., NS2, is a friendly tool that offers a virtual environment, which allows learning about the number of rules governing a sensor network's topologies to carry out various settings and communications' formats or patterns. In NS2 application services, it has been defined on how the sensors nodes perform when they identify a strange phenomenon. A sensor node may be sending a massage to a main station if it continues to identify that phenomenon. This paper proposes an enhancement method for this network simulator as a framework applicable to such called self-configured network, and with an aim to allow related paper works testing possible by the simulator. Furthermore, the new framework is utilized for temperature and carbon monoxide sensing and dissemination into the network.
Wireless Sensor Network has become a catchphrase recently starting from agriculture, military sce... more Wireless Sensor Network has become a catchphrase recently starting from agriculture, military scenario, emergency situation, weather monitoring etc. Deployment of sensor network involves addressing a lot of practical issues like limited energy resource of sensor nodes, self-forming and self-healing of automated sensor networks, data fusion and communication capabilities. One of commonly used simulator –i.e. NS2, is a friendly tool that offers a virtual environment, which allows learning about the number of rules governing a sensor network's topologies to carry out various settings and communications' formats or patterns. In NS2 application services, it has been defined on how the sensors nodes perform when they identify a strange phenomenon. A sensor node may be sending a massage to a main station if it continues to identify that phenomenon. This paper proposes an enhancement method for this network simulator as a framework applicable to such called self-configured network, and with an aim to allow related paper works testing possible by the simulator. Furthermore, the new framework is utilized for temperature and carbon monoxide sensing and dissemination into the network.
This paper aimed to simulate Ethernet LAN with different network configurations using OPNET model... more This paper aimed to simulate Ethernet LAN with different network configurations
using OPNET modeller, studied the impact of having different network configurations in Ethernet
LANs in terms of identified parameter and analyzed the end results and concludes the network
behavior of the scenarios simulated. However, the simulation had been carried out by taking into
account four performance parameters which are network load, network delay, network
throughput, and the percentage of network utilization. From the findings of these four metrics in
this paper, we found out that by adding or changing the link to 100Gb, the performance of the
network will increase significantly. Therefor the results gain suggests that, the network
performance will be higher when it is upgraded to a 100Gb bandwidth links. This is depicted in
the findings of the load, delay, throughput, and utilization percentage comparison of the two
network settings. This also showed that the existing network -. Universiti Teknikal Malaysia
Melaka- is capable to handle the transition, but many other parameters and consideration should
be taken into account before this changes is being implemented in the actual network.
Nowadays, the tradition healthcare system becomes inefficient as there are a lot of people who ha... more Nowadays, the tradition healthcare system becomes inefficient as there are a lot of people who have long-lasting diseases that require continuous medical care and treatment. Cloud computing brings substantial benefits to the healthcare domain including hospitals, medical centers and health clinics that necessitate fast access to some facilities for computing and storage which are not usually available in the traditional sites. Furthermore, healthcare data should to be shared across several locations that may burden the healthcare organization and the patient causing major delay in treatment and time wastage. Cloud satisfy such requirements by furnishing the healthcare providers an unbelievable opportunity to enhance the services provided to their customers, patients and also for sharing information effectively and improving operational efficiency as well. However, cloud computing is associated with security concerns. The present cloud-based healthcare systems lack of efficient management of medical data and unreliability of end-system communication to the cloud databases. Therefore, with the growth of the demand on healthcare and the availability of new technologies, a secure and reliable communication unit along with an efficient cloud service-based healthcare system is highly required. This paper presents the design structure and operation of an innovative secure and reliable communication module that would ensure the privacy of the patient biological data.
Conference Presentations by Mohamed Doheir
The growth of mobile devices technology such as smart phones and tablets has led to a growing ubi... more The growth of mobile devices technology such as smart phones and tablets has led to a growing ubiquitous computing paradigm, in which computing is distributed and available anytime, anywhere and supported by different devices. As recent developments of mobile phones researches, now it can perform variable medical tasks such as health medical records. Internet continuous development affects the way of information and data share making it easier for the patient to access information, In correspondence with Internet development, mobile technology has a strong data delivery of health record information which can be accessed by the patient anytime, anywhere. This paper will discuss the methodology of securing patient data using Steganography. The name Steganography is taken from a work done by Trithemus entitled “Steganographia” which is a technique of hiding information. Steganography comes from the Greek word means “covered writing" in other words, hiding information behind other information.
The aim of this paper is to propose the new conceptual cloud computing modelling for improving he... more The aim of this paper is to propose the new conceptual cloud computing modelling for improving healthcare management in health organizations. The new conceptual cloud computing modelling modelling for improving healthcare management includes cloud computing service structures as cloud communications as a service, software as a service, platform as a service, and infrastructure as a service; and deployment models include public cloud, private cloud, hybrid cloud;and resources management in cloud computing like cloud mobility and API management, cloud organization process management, knowledge Administration of cloud systems, and cloud operation and environment management. However, we will determine the critical issues for cloud healthcare management in all components of cloud computing system. After then we will determine cloud solutions and controls to reduce critical issues in healthcare management. All critical issues in cloud computing will classify based on cloud computing manag...
Purpose: Electronic health records (EHRs) exchange improves hospital quality and reduces health c... more Purpose: Electronic health records (EHRs) exchange improves hospital quality and reduces health costs. However, few studies address the antecedent factors of healthcare professionals’ intentions to use EHR system. We examine the factors that effecting on EHRs acceptance by Unified Theory of Acceptance and Use of Technology (UTAUT2) model, this is a new methodology for evaluating acceptance of EHRs. We propose a theoretical model to explain the exercise behavior of health care professionals’ to use an EHR system acceptance. Methods: We conducted a pilot test survey in Jordan hospitals to collect data from healthcare professionals who had experience using the EHR systems. A valid sample of 22 responses from 70 questionnaires were collected for data analysis to pilot test
Advanced Science Letters, 2014
Wireless Sensor Network has become a catchphrase recently starting from agriculture, military sce... more Wireless Sensor Network has become a catchphrase recently starting from agriculture, military scenario, emergency situation, weather monitoring etc. Deployment of sensor network involves addressing a lot of practical issues like limited energy resource of sensor nodes, self-forming and self-healing of automated sensor networks, data fusion and communication capabilities. One of commonly used simulator—i.e., NS2, is a friendly tool that offers a virtual environment, which allows learning about the number of rules governing a sensor network's topologies to carry out various settings and communications' formats or patterns. In NS2 application services, it has been defined on how the sensors nodes perform when they identify a strange phenomenon. A sensor node may be sending a massage to a main station if it continues to identify that phenomenon. This paper proposes an enhancement method for this network simulator as a framework applicable to such called self-configured network, ...
Personal Health Records (PHRs) can be considered as one of the most important health technologies... more Personal Health Records (PHRs) can be considered as one of the most important health technologies. PHRs enroll the patients directly to their health decision making through giving them the authority to control and share their health information. Testing the user acceptance toward new technology is a vital process. Over the previous decades many models have been used and the latest one was UTAUT2. UTAUT2 have been widely used in e-business and gaming user acceptance researches, whereas, it has been rarely used in health field. This study proposes a combination of UTAUT2 and PMT in order to investigate the user acceptance of PHRs. Relevant factors may be added at the literature review stage. The final model will be used as a framework to investigate the user acceptance of PHRs in Malaysia.
Advanced Science Letters, 2015
International Journal of Advanced Science and Technology, 2015
Advanced Science Letters, 2014
ABSTRACT Wireless Sensor Network has become a catchphrase recently starting from agriculture, mil... more ABSTRACT Wireless Sensor Network has become a catchphrase recently starting from agriculture, military scenario, emergency situation, weather monitoring etc. Deployment of sensor network involves addressing a lot of practical issues like limited energy resource of sensor nodes, self-forming and self-healing of automated sensor networks, data fusion and communication capabilities. One of commonly used simulator—i.e., NS2, is a friendly tool that offers a virtual environment, which allows learning about the number of rules governing a sensor network's topologies to carry out various settings and communications' formats or patterns. In NS2 application services, it has been defined on how the sensors nodes perform when they identify a strange phenomenon. A sensor node may be sending a massage to a main station if it continues to identify that phenomenon. This paper proposes an enhancement method for this network simulator as a framework applicable to such called self-configured network, and with an aim to allow related paper works testing possible by the simulator. Furthermore, the new framework is utilized for temperature and carbon monoxide sensing and dissemination into the network.
Wireless Sensor Network has become a catchphrase recently starting from agriculture, military sce... more Wireless Sensor Network has become a catchphrase recently starting from agriculture, military scenario, emergency situation, weather monitoring etc. Deployment of sensor network involves addressing a lot of practical issues like limited energy resource of sensor nodes, self-forming and self-healing of automated sensor networks, data fusion and communication capabilities. One of commonly used simulator –i.e. NS2, is a friendly tool that offers a virtual environment, which allows learning about the number of rules governing a sensor network's topologies to carry out various settings and communications' formats or patterns. In NS2 application services, it has been defined on how the sensors nodes perform when they identify a strange phenomenon. A sensor node may be sending a massage to a main station if it continues to identify that phenomenon. This paper proposes an enhancement method for this network simulator as a framework applicable to such called self-configured network, and with an aim to allow related paper works testing possible by the simulator. Furthermore, the new framework is utilized for temperature and carbon monoxide sensing and dissemination into the network.
This paper aimed to simulate Ethernet LAN with different network configurations using OPNET model... more This paper aimed to simulate Ethernet LAN with different network configurations
using OPNET modeller, studied the impact of having different network configurations in Ethernet
LANs in terms of identified parameter and analyzed the end results and concludes the network
behavior of the scenarios simulated. However, the simulation had been carried out by taking into
account four performance parameters which are network load, network delay, network
throughput, and the percentage of network utilization. From the findings of these four metrics in
this paper, we found out that by adding or changing the link to 100Gb, the performance of the
network will increase significantly. Therefor the results gain suggests that, the network
performance will be higher when it is upgraded to a 100Gb bandwidth links. This is depicted in
the findings of the load, delay, throughput, and utilization percentage comparison of the two
network settings. This also showed that the existing network -. Universiti Teknikal Malaysia
Melaka- is capable to handle the transition, but many other parameters and consideration should
be taken into account before this changes is being implemented in the actual network.
Nowadays, the tradition healthcare system becomes inefficient as there are a lot of people who ha... more Nowadays, the tradition healthcare system becomes inefficient as there are a lot of people who have long-lasting diseases that require continuous medical care and treatment. Cloud computing brings substantial benefits to the healthcare domain including hospitals, medical centers and health clinics that necessitate fast access to some facilities for computing and storage which are not usually available in the traditional sites. Furthermore, healthcare data should to be shared across several locations that may burden the healthcare organization and the patient causing major delay in treatment and time wastage. Cloud satisfy such requirements by furnishing the healthcare providers an unbelievable opportunity to enhance the services provided to their customers, patients and also for sharing information effectively and improving operational efficiency as well. However, cloud computing is associated with security concerns. The present cloud-based healthcare systems lack of efficient management of medical data and unreliability of end-system communication to the cloud databases. Therefore, with the growth of the demand on healthcare and the availability of new technologies, a secure and reliable communication unit along with an efficient cloud service-based healthcare system is highly required. This paper presents the design structure and operation of an innovative secure and reliable communication module that would ensure the privacy of the patient biological data.
The growth of mobile devices technology such as smart phones and tablets has led to a growing ubi... more The growth of mobile devices technology such as smart phones and tablets has led to a growing ubiquitous computing paradigm, in which computing is distributed and available anytime, anywhere and supported by different devices. As recent developments of mobile phones researches, now it can perform variable medical tasks such as health medical records. Internet continuous development affects the way of information and data share making it easier for the patient to access information, In correspondence with Internet development, mobile technology has a strong data delivery of health record information which can be accessed by the patient anytime, anywhere. This paper will discuss the methodology of securing patient data using Steganography. The name Steganography is taken from a work done by Trithemus entitled “Steganographia” which is a technique of hiding information. Steganography comes from the Greek word means “covered writing" in other words, hiding information behind other information.