Sanaa Kaddoura | Zayed University (original) (raw)
Papers by Sanaa Kaddoura
Lecture notes in networks and systems, Oct 25, 2021
SpringerBriefs in computer science, 2023
SpringerBriefs in computer science, 2023
IEEE Aerospace and Electronic Systems Magazine, 1996
Systems using computational intelligence and soft computing have been successfully developed for ... more Systems using computational intelligence and soft computing have been successfully developed for many industrial and space applications. These systems seek to emulate the type of reasoning that humans perform when solving complex tasks. The field of soft computing, as defined by Zadeh-the inventor of fuzzy logic-encompasses fuzzy logic as well as other methodologies such as neural networks, genetic algorithms, and
SpringerBriefs in computer science, 2023
In this article, the authors present the findings of introducing interactive learning in higher e... more In this article, the authors present the findings of introducing interactive learning in higher education.
The study was conducted on first-year undergraduate students of information technology in the United Arab Emirates
(UAE). One of this study’s primary goals was to change the lecture-based classes of introductory courses from rote
learning to interactive learning mode. Another goal was to verify the impact of interactive learning on improving higher
education students’ motivation and engagement in the learning process. Finally, this study tested the role of Nearpod as
a tool for interactive learning. Because Nearpod can be integrated with Zoom, it facilitated on-line learning during the
Covid-19 pandemic. Students’ response to the new teaching style was measured through a quantitative research method.
A questionnaire was prepared for this purpose and distributed to the students through Google forms. The results of the
questionnaire showed a high level of students’ satisfaction towards the learning method. They also responded positively
to using Nearpod as a tool for interactive learning, and they recommended that it be used in all their courses
The presence of spam content in social media is tremendously increasing, and therefore the detect... more The presence of spam content in social media is tremendously increasing, and therefore the detection of spam has become vital. The spam contents increase as people extensively use social media, i.e., Facebook, Twitter, YouTube, and E-mail. The time spent by people using social media is overgrowing, especially in the time of the pandemic. Users get a lot of text messages through social media, and they cannot recognize the spam content in these messages. Spam messages contain malicious links, apps, fake accounts, fake news, reviews, rumors, etc. To improve social media security, the detection and control of spam text are essential. This paper presents a detailed survey on the latest developments in spam text detection and classification in social media. The various techniques involved in spam detection and classification involving Machine Learning, Deep Learning, and text-based approaches are discussed in this paper. We also present the challenges encountered in the identification of spam with its control mechanisms and datasets used in existing works involving spam detection.
The latest Covid-19 pandemic changed the workflow of different sectors, mainly education. Academi... more The latest Covid-19 pandemic changed the workflow of different sectors, mainly education. Academic
institutions and external examination providers responded differently to the lockdown enforced by the pandemic.
The widespread pandemic meant that schools and universities could not operate as they used to. Educators and learners
were forced to teach and learn from their homes. In addition to the logistical complexity of such a solution,
the examination is another challenge. Examinations were usually held in a monitored environment, with results generally
deciding students’ qualifications for university admission. Various institutions dealt differently with on-line
examinations and faced challenges on all levels. Some institutions came up with opportunities for others to learn from
their experiences. However, considering the recency of the Covid-19 pandemic, only limited published academic
literature reviewed the impact of the pandemic on on-line assessment. In this article, the authors review and summarise
research examining the impact of the pandemic on on-line examination globally, as well as highlight challenges and
opportunities for policymakers, educators, researchers and higher education decision-makers regarding on-line
examinations in this new environment.
The latest Covid-19 pandemic changed the workflow of different sectors, mainly education. Academi... more The latest Covid-19 pandemic changed the workflow of different sectors, mainly education. Academic
institutions and external examination providers responded differently to the lockdown enforced by the pandemic.
The widespread pandemic meant that schools and universities could not operate as they used to. Educators and learners
were forced to teach and learn from their homes. In addition to the logistical complexity of such a solution,
the examination is another challenge. Examinations were usually held in a monitored environment, with results generally
deciding students’ qualifications for university admission. Various institutions dealt differently with on-line
examinations and faced challenges on all levels. Some institutions came up with opportunities for others to learn from
their experiences. However, considering the recency of the Covid-19 pandemic, only limited published academic
literature reviewed the impact of the pandemic on on-line assessment. In this article, the authors review and summarise
research examining the impact of the pandemic on on-line examination globally, as well as highlight challenges and
opportunities for policymakers, educators, researchers and higher education decision-makers regarding on-line
examinations in this new environment.
Covid-19 has been a life-changer in the sphere of online education. With complete lockdown in var... more Covid-19 has been a life-changer in the sphere of online education. With complete lockdown in various countries, there has been a tumultuous increase in the need for providing online education, and hence, it has become mandatory for examiners to ensure that a fair methodology is followed for evaluation, and academic integrity is met. A plethora of literature is available related to methods to mitigate cheating during online examinations. A systematic literature review (SLR) has been followed in our article which aims at introducing the research gap in terms of the usage of soft computing techniques to combat cheating during online examinations. We have also presented state-of-the-art methods followed, which are capable of mitigating online cheating, namely, face recognition, face expression recognition, head posture analysis, eye gaze tracking, network data trafc analysis, and detection of IP spoofng. A discussion on improvement of existing online cheating detection systems has also been presented.
Mobile ad hoc networks (MANETS) are nodes connected in a peer-to-peer fashion. Because MANETs hav... more Mobile ad hoc networks (MANETS) are nodes connected in a peer-to-peer fashion. Because MANETs have challenging characteristics such as mobility and limited energy, traditional existing routing protocols are not very efficient-they suffer several limitations in terms of network stability and lifetime, especially in the emerging era of IoT, crowd-sensing, and smart cities. In this work, we present SDODV, a new smart and dynamic on-demand distance vector routing protocol for mobile ad hoc networks that addresses the shortcomings of existing routing protocols. Our proposed adaptive algorithm effectively increases the built network's lifetime by considering the network topology when establishing a route. It monitors the traffic load, nodes mobility, neighborhood density, and battery power to adjust packets accordingly. This protocol is based on the distributed reinforcement learning approach and on the traditional AODV. SDODV improves the quality of service because it chooses the shortest and most stable path while considering mobility, bandwidth, and power. Experimental results prove that SDODV outperforms the shortest path method and reduces energy consumption.
Journal, 2023
Metaverse is invading the educational sector and will change human-computer interaction technique... more Metaverse is invading the educational sector and will change human-computer interaction techniques. Prominent technology executives are developing novel ways to turn the Metaverse into a learning environment, considering the rapid growth of technology. Since the COVID-19 outbreak, people have grown accustomed to teleworking, telemedicine, and numerous other forms of distance interaction. Recently, the Metaverse has been the focus of many educators. With Facebook's statement that it was rebranding and promoting itself as Meta, this field saw a surge in interest in the areas of computer science and education. There is a literature gap in studying the Metaverse's role in education. This article is a systematic review following the PRISMA framework that reviews the role of the Metaverse in education to shrink the literature gap. It presents various educational uses to aid future research in this field. Additionally, it demonstrates how enabling technologies like extended reality (XR) and the internet of everything (IoE) will significantly impact educational services in the Metaverses of the future of teaching and learning. The article also outlines key challenges, ethical issues, and potential threats to using the Metaverse for education to offer a road map for future research that will investigate how the Metaverse will improve learning and teaching experiences.
PeerJ Computer Science, 2022
The presence of spam content in social media is tremendously increasing, and therefore the detect... more The presence of spam content in social media is tremendously increasing, and therefore the detection of spam has become vital. The spam contents increase as people extensively use social media,i.e., Facebook, Twitter, YouTube, and E-mail. The time spent by people using social media is overgrowing, especially in the time of the pandemic. Users get a lot of text messages through social media, and they cannot recognize the spam content in these messages. Spam messages contain malicious links, apps, fake accounts, fake news, reviews, rumors, etc. To improve social media security, the detection and control of spam text are essential. This paper presents a detailed survey on the latest developments in spam text detection and classification in social media. The various techniques involved in spam detection and classification involving Machine Learning, Deep Learning, and text-based approaches are discussed in this paper. We also present the challenges encountered in the identification of s...
Advances in Intelligent Systems and Computing, 2021
International audienc
No one can deny that information technology courses can be an excellent initiative for increasing... more No one can deny that information technology courses can be an excellent initiative for increasing the awareness of environmental and health problems. Hence, information technology instructors play a critical role in spreading awareness of green technology and reinforcing sustainability. The Introduction to Information Technology (IIT) course contains many topics that can be directed in an intelligent way to spread awareness about sustainability. In this paper, we suggest a detailed curriculum for the IT course that converts a standard curriculum into a green one. The goal of this curriculum is to produce a new generation that is aware enough about the role of technology in our life and its impact on the environment. The course topics will be the answers to the following questions. First, how to avoid the negative impact of technology on health and the environment. Second, how to decrease the negative impact that cannot be avoided or find a solution for it. Finally, what are the alte...
Proceedings of the 21st Annual Conference on Information Technology Education, 2020
Lecture-based classes became an old strategy of teaching even in higher education. Education now ... more Lecture-based classes became an old strategy of teaching even in higher education. Education now focuses on student-centered strategies that actively engage students in their learning and how teacher can design classes to facilitate learning process. This paper presents some practices for teaching in higher education.
2021 5th Cyber Security in Networking Conference (CSNet), 2021
Due to the increase in Internet usage through the past years, cyber-attacks have rapidly increase... more Due to the increase in Internet usage through the past years, cyber-attacks have rapidly increased, leading to high personal information and financial loss. Cyberattacks can include phishing, spamming, and malware. Because websites, the most common element of the Internet, are widely used, hackers find their targets to attack. Therefore, the detection of malicious websites is critical for organizations and individuals to increase security. The earlier a malicious website is detected, the faster it is defended. In this paper, a dataset is analyzed and applied to multiple supervised machine learning models such as Random Forest, Artificial Neural Network, K-nearest neighbors, and Support Vector Machine. The dataset attributes are extracted based on the application layer and different network characteristics. The experimental studies with many benign and malicious websites obtained from real-life Internet resources show a high prediction performance. Due to the imbalanced dataset studied in this paper, the F1-score was measured instead of the accuracy. The support vector machine algorithm showed the highest performance over all the other algorithms studied, with a value of 92%.
Intelligent Automation & Soft Computing, 2022
Parkinson's disease (PD) is a nervous system disorder first described as a neurological condition... more Parkinson's disease (PD) is a nervous system disorder first described as a neurological condition in 1817. It is one of the more prevalent diseases in the elderly, and Alzheimer's is the second most common neurodegenerative illness. It impacts the patient's movement. Symptoms start gradually with tremors, stiffness in movement, and speech and voice disorders. Researches proved that 89% of patients with Parkinson's has speech disorder including uncertain articulation, hoarse and breathy voice and monotone pitch. The cause behind this voice change is the reduction of dopamine due to damage of neurons in the substantia nigra responsible for dopamine production. In this work, Parkinson's disease is classified with the help of human voice signals. Six different machine learning (ML) algorithms are used in the classification: Stochastic Gradient Descent (SGD) Classifier, Extreme Gradient Boosting (XGB) Classifier, Logistic Regression Classifier, Random Forest Classifier, K-Nearest Neighbour (KNN) Classifier, and Decision Tree (DT) Classifier. This research aims to classify Parkinson's disease using human voice signals and extract essential features to reduce the complexity of the dataset. Then, human voice signals are analyzed to check the voice intensity and spectrum for PD patients. Then, machine learning classifiers are applied to classify the PD patients based on the extracted features. The results show that SGD-Classifier has 91% accuracy, XGB-Classifier has 95% accuracy, Logistic Regression has 91% accuracy, Random Forest shows 97% accuracy, KNN shows 95% accuracy, and Decision Tree has 95% accuracy. Hence, Random Forest has the highest accuracy. The disease can be studied more by looking for more characteristics of PD patients to enhance its proper use in the medical field.
Advances in Information Security, Privacy, and Ethics, 2021
Blockchain is one of the trendy technologies in the current era. All industries are merging block... more Blockchain is one of the trendy technologies in the current era. All industries are merging blockchain with their production line to benefit from its features such as security and decentralized data. One of the main problems in the healthcare system is the lack of interoperability (i.e., data should be patient-centered and not institution-centered). Healthcare information systems, in the current state, cannot communicate. Each organization works within its boundaries and owns its data. To make this shift, many challenges should be solved such as data privacy, standards, scalability, and others. Blockchain can solve these problems by giving the patients control over their data; therefore, they can share it with any institution for a time period. It is expected that blockchain will improve healthcare data management. In this chapter, the authors study the opportunity of blockchain to leverage biomedical and healthcare applications and research. Blockchain also contributes to the medic...
Lecture notes in networks and systems, Oct 25, 2021
SpringerBriefs in computer science, 2023
SpringerBriefs in computer science, 2023
IEEE Aerospace and Electronic Systems Magazine, 1996
Systems using computational intelligence and soft computing have been successfully developed for ... more Systems using computational intelligence and soft computing have been successfully developed for many industrial and space applications. These systems seek to emulate the type of reasoning that humans perform when solving complex tasks. The field of soft computing, as defined by Zadeh-the inventor of fuzzy logic-encompasses fuzzy logic as well as other methodologies such as neural networks, genetic algorithms, and
SpringerBriefs in computer science, 2023
In this article, the authors present the findings of introducing interactive learning in higher e... more In this article, the authors present the findings of introducing interactive learning in higher education.
The study was conducted on first-year undergraduate students of information technology in the United Arab Emirates
(UAE). One of this study’s primary goals was to change the lecture-based classes of introductory courses from rote
learning to interactive learning mode. Another goal was to verify the impact of interactive learning on improving higher
education students’ motivation and engagement in the learning process. Finally, this study tested the role of Nearpod as
a tool for interactive learning. Because Nearpod can be integrated with Zoom, it facilitated on-line learning during the
Covid-19 pandemic. Students’ response to the new teaching style was measured through a quantitative research method.
A questionnaire was prepared for this purpose and distributed to the students through Google forms. The results of the
questionnaire showed a high level of students’ satisfaction towards the learning method. They also responded positively
to using Nearpod as a tool for interactive learning, and they recommended that it be used in all their courses
The presence of spam content in social media is tremendously increasing, and therefore the detect... more The presence of spam content in social media is tremendously increasing, and therefore the detection of spam has become vital. The spam contents increase as people extensively use social media, i.e., Facebook, Twitter, YouTube, and E-mail. The time spent by people using social media is overgrowing, especially in the time of the pandemic. Users get a lot of text messages through social media, and they cannot recognize the spam content in these messages. Spam messages contain malicious links, apps, fake accounts, fake news, reviews, rumors, etc. To improve social media security, the detection and control of spam text are essential. This paper presents a detailed survey on the latest developments in spam text detection and classification in social media. The various techniques involved in spam detection and classification involving Machine Learning, Deep Learning, and text-based approaches are discussed in this paper. We also present the challenges encountered in the identification of spam with its control mechanisms and datasets used in existing works involving spam detection.
The latest Covid-19 pandemic changed the workflow of different sectors, mainly education. Academi... more The latest Covid-19 pandemic changed the workflow of different sectors, mainly education. Academic
institutions and external examination providers responded differently to the lockdown enforced by the pandemic.
The widespread pandemic meant that schools and universities could not operate as they used to. Educators and learners
were forced to teach and learn from their homes. In addition to the logistical complexity of such a solution,
the examination is another challenge. Examinations were usually held in a monitored environment, with results generally
deciding students’ qualifications for university admission. Various institutions dealt differently with on-line
examinations and faced challenges on all levels. Some institutions came up with opportunities for others to learn from
their experiences. However, considering the recency of the Covid-19 pandemic, only limited published academic
literature reviewed the impact of the pandemic on on-line assessment. In this article, the authors review and summarise
research examining the impact of the pandemic on on-line examination globally, as well as highlight challenges and
opportunities for policymakers, educators, researchers and higher education decision-makers regarding on-line
examinations in this new environment.
The latest Covid-19 pandemic changed the workflow of different sectors, mainly education. Academi... more The latest Covid-19 pandemic changed the workflow of different sectors, mainly education. Academic
institutions and external examination providers responded differently to the lockdown enforced by the pandemic.
The widespread pandemic meant that schools and universities could not operate as they used to. Educators and learners
were forced to teach and learn from their homes. In addition to the logistical complexity of such a solution,
the examination is another challenge. Examinations were usually held in a monitored environment, with results generally
deciding students’ qualifications for university admission. Various institutions dealt differently with on-line
examinations and faced challenges on all levels. Some institutions came up with opportunities for others to learn from
their experiences. However, considering the recency of the Covid-19 pandemic, only limited published academic
literature reviewed the impact of the pandemic on on-line assessment. In this article, the authors review and summarise
research examining the impact of the pandemic on on-line examination globally, as well as highlight challenges and
opportunities for policymakers, educators, researchers and higher education decision-makers regarding on-line
examinations in this new environment.
Covid-19 has been a life-changer in the sphere of online education. With complete lockdown in var... more Covid-19 has been a life-changer in the sphere of online education. With complete lockdown in various countries, there has been a tumultuous increase in the need for providing online education, and hence, it has become mandatory for examiners to ensure that a fair methodology is followed for evaluation, and academic integrity is met. A plethora of literature is available related to methods to mitigate cheating during online examinations. A systematic literature review (SLR) has been followed in our article which aims at introducing the research gap in terms of the usage of soft computing techniques to combat cheating during online examinations. We have also presented state-of-the-art methods followed, which are capable of mitigating online cheating, namely, face recognition, face expression recognition, head posture analysis, eye gaze tracking, network data trafc analysis, and detection of IP spoofng. A discussion on improvement of existing online cheating detection systems has also been presented.
Mobile ad hoc networks (MANETS) are nodes connected in a peer-to-peer fashion. Because MANETs hav... more Mobile ad hoc networks (MANETS) are nodes connected in a peer-to-peer fashion. Because MANETs have challenging characteristics such as mobility and limited energy, traditional existing routing protocols are not very efficient-they suffer several limitations in terms of network stability and lifetime, especially in the emerging era of IoT, crowd-sensing, and smart cities. In this work, we present SDODV, a new smart and dynamic on-demand distance vector routing protocol for mobile ad hoc networks that addresses the shortcomings of existing routing protocols. Our proposed adaptive algorithm effectively increases the built network's lifetime by considering the network topology when establishing a route. It monitors the traffic load, nodes mobility, neighborhood density, and battery power to adjust packets accordingly. This protocol is based on the distributed reinforcement learning approach and on the traditional AODV. SDODV improves the quality of service because it chooses the shortest and most stable path while considering mobility, bandwidth, and power. Experimental results prove that SDODV outperforms the shortest path method and reduces energy consumption.
Journal, 2023
Metaverse is invading the educational sector and will change human-computer interaction technique... more Metaverse is invading the educational sector and will change human-computer interaction techniques. Prominent technology executives are developing novel ways to turn the Metaverse into a learning environment, considering the rapid growth of technology. Since the COVID-19 outbreak, people have grown accustomed to teleworking, telemedicine, and numerous other forms of distance interaction. Recently, the Metaverse has been the focus of many educators. With Facebook's statement that it was rebranding and promoting itself as Meta, this field saw a surge in interest in the areas of computer science and education. There is a literature gap in studying the Metaverse's role in education. This article is a systematic review following the PRISMA framework that reviews the role of the Metaverse in education to shrink the literature gap. It presents various educational uses to aid future research in this field. Additionally, it demonstrates how enabling technologies like extended reality (XR) and the internet of everything (IoE) will significantly impact educational services in the Metaverses of the future of teaching and learning. The article also outlines key challenges, ethical issues, and potential threats to using the Metaverse for education to offer a road map for future research that will investigate how the Metaverse will improve learning and teaching experiences.
PeerJ Computer Science, 2022
The presence of spam content in social media is tremendously increasing, and therefore the detect... more The presence of spam content in social media is tremendously increasing, and therefore the detection of spam has become vital. The spam contents increase as people extensively use social media,i.e., Facebook, Twitter, YouTube, and E-mail. The time spent by people using social media is overgrowing, especially in the time of the pandemic. Users get a lot of text messages through social media, and they cannot recognize the spam content in these messages. Spam messages contain malicious links, apps, fake accounts, fake news, reviews, rumors, etc. To improve social media security, the detection and control of spam text are essential. This paper presents a detailed survey on the latest developments in spam text detection and classification in social media. The various techniques involved in spam detection and classification involving Machine Learning, Deep Learning, and text-based approaches are discussed in this paper. We also present the challenges encountered in the identification of s...
Advances in Intelligent Systems and Computing, 2021
International audienc
No one can deny that information technology courses can be an excellent initiative for increasing... more No one can deny that information technology courses can be an excellent initiative for increasing the awareness of environmental and health problems. Hence, information technology instructors play a critical role in spreading awareness of green technology and reinforcing sustainability. The Introduction to Information Technology (IIT) course contains many topics that can be directed in an intelligent way to spread awareness about sustainability. In this paper, we suggest a detailed curriculum for the IT course that converts a standard curriculum into a green one. The goal of this curriculum is to produce a new generation that is aware enough about the role of technology in our life and its impact on the environment. The course topics will be the answers to the following questions. First, how to avoid the negative impact of technology on health and the environment. Second, how to decrease the negative impact that cannot be avoided or find a solution for it. Finally, what are the alte...
Proceedings of the 21st Annual Conference on Information Technology Education, 2020
Lecture-based classes became an old strategy of teaching even in higher education. Education now ... more Lecture-based classes became an old strategy of teaching even in higher education. Education now focuses on student-centered strategies that actively engage students in their learning and how teacher can design classes to facilitate learning process. This paper presents some practices for teaching in higher education.
2021 5th Cyber Security in Networking Conference (CSNet), 2021
Due to the increase in Internet usage through the past years, cyber-attacks have rapidly increase... more Due to the increase in Internet usage through the past years, cyber-attacks have rapidly increased, leading to high personal information and financial loss. Cyberattacks can include phishing, spamming, and malware. Because websites, the most common element of the Internet, are widely used, hackers find their targets to attack. Therefore, the detection of malicious websites is critical for organizations and individuals to increase security. The earlier a malicious website is detected, the faster it is defended. In this paper, a dataset is analyzed and applied to multiple supervised machine learning models such as Random Forest, Artificial Neural Network, K-nearest neighbors, and Support Vector Machine. The dataset attributes are extracted based on the application layer and different network characteristics. The experimental studies with many benign and malicious websites obtained from real-life Internet resources show a high prediction performance. Due to the imbalanced dataset studied in this paper, the F1-score was measured instead of the accuracy. The support vector machine algorithm showed the highest performance over all the other algorithms studied, with a value of 92%.
Intelligent Automation & Soft Computing, 2022
Parkinson's disease (PD) is a nervous system disorder first described as a neurological condition... more Parkinson's disease (PD) is a nervous system disorder first described as a neurological condition in 1817. It is one of the more prevalent diseases in the elderly, and Alzheimer's is the second most common neurodegenerative illness. It impacts the patient's movement. Symptoms start gradually with tremors, stiffness in movement, and speech and voice disorders. Researches proved that 89% of patients with Parkinson's has speech disorder including uncertain articulation, hoarse and breathy voice and monotone pitch. The cause behind this voice change is the reduction of dopamine due to damage of neurons in the substantia nigra responsible for dopamine production. In this work, Parkinson's disease is classified with the help of human voice signals. Six different machine learning (ML) algorithms are used in the classification: Stochastic Gradient Descent (SGD) Classifier, Extreme Gradient Boosting (XGB) Classifier, Logistic Regression Classifier, Random Forest Classifier, K-Nearest Neighbour (KNN) Classifier, and Decision Tree (DT) Classifier. This research aims to classify Parkinson's disease using human voice signals and extract essential features to reduce the complexity of the dataset. Then, human voice signals are analyzed to check the voice intensity and spectrum for PD patients. Then, machine learning classifiers are applied to classify the PD patients based on the extracted features. The results show that SGD-Classifier has 91% accuracy, XGB-Classifier has 95% accuracy, Logistic Regression has 91% accuracy, Random Forest shows 97% accuracy, KNN shows 95% accuracy, and Decision Tree has 95% accuracy. Hence, Random Forest has the highest accuracy. The disease can be studied more by looking for more characteristics of PD patients to enhance its proper use in the medical field.
Advances in Information Security, Privacy, and Ethics, 2021
Blockchain is one of the trendy technologies in the current era. All industries are merging block... more Blockchain is one of the trendy technologies in the current era. All industries are merging blockchain with their production line to benefit from its features such as security and decentralized data. One of the main problems in the healthcare system is the lack of interoperability (i.e., data should be patient-centered and not institution-centered). Healthcare information systems, in the current state, cannot communicate. Each organization works within its boundaries and owns its data. To make this shift, many challenges should be solved such as data privacy, standards, scalability, and others. Blockchain can solve these problems by giving the patients control over their data; therefore, they can share it with any institution for a time period. It is expected that blockchain will improve healthcare data management. In this chapter, the authors study the opportunity of blockchain to leverage biomedical and healthcare applications and research. Blockchain also contributes to the medic...