Shada Alsalamah

ORCID: 0000-0002-3054-5015
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Blockchain Technology Applications and Security
  • Artificial Intelligence in Healthcare and Education
  • COVID-19 diagnosis using AI
  • IoT and Edge/Fog Computing
  • Electronic Health Records Systems
  • Information and Cyber Security
  • Cloud Data Security Solutions
  • Access Control and Trust
  • Artificial Intelligence in Healthcare
  • FinTech, Crowdfunding, Digital Finance
  • Information Systems Theories and Implementation
  • Mobile Health and mHealth Applications
  • Data-Driven Disease Surveillance
  • Privacy, Security, and Data Protection
  • Autopsy Techniques and Outcomes
  • Global Health Workforce Issues
  • Teaching and Learning Programming
  • Telemedicine and Telehealth Implementation
  • Machine Learning in Healthcare
  • Information Systems Education and Curriculum Development
  • Ethics and Social Impacts of AI
  • Medical Coding and Health Information
  • ECG Monitoring and Analysis
  • Family Caregiving in Mental Illness
  • Radiomics and Machine Learning in Medical Imaging

King Saud University
2016-2025

World Health Organization
2021-2024

World Health Organization - Pakistan
2022

Massachusetts Institute of Technology
2018-2019

Cardiff University
2010-2013

Coronavirus disease 2019 (COVID-19), originating in China, has rapidly spread worldwide. Physicians must examine infected patients and make timely decisions to isolate them. However, completing these processes is difficult due limited time availability of expert radiologists, as well limitations the reverse-transcription polymerase chain reaction (RT-PCR) method. Deep learning, a sophisticated machine learning technique, leverages radiological imaging modalities for diagnosis image...

10.3390/s24082641 article EN cc-by Sensors 2024-04-20

Delivering electronic health care (eHealth) services across multi-cloud providers to implement patient-centric demands a trustworthy brokering architecture. Specifically, such an architecture should aggregate relevant medical information allow informed decision-making. It also ensure that this is complete and authentic no one has tampered with it. Brokers deployed in eHealth may fall short of meeting criteria due two key behaviors. The first involves violating international health-data...

10.3390/electronics8060602 article EN Electronics 2019-05-29

Cloud computing plays a major role in smart cities development by facilitating the delivery of various services an efficient and effective manner. In Peer‐to‐Peer (P2P) federated clouds ecosystem, multiple Service Providers (CSPs) collaborate share among them when experiencing shortage certain resources. Hence, incoming service requests to this specific resource can be delegated other members. Nevertheless, lack preexisting trust relationship CSPs distributed environment affect quality...

10.1155/2018/1073216 article EN cc-by Wireless Communications and Mobile Computing 2018-01-01

In mass disasters with multinational victims, it is critical to identify the deceased for judicial, ethical, religious and human rights reasons, as well allow next of kin complete grieving process. Disaster Victim Identification (DVI) process a complex procedure where Post-mortem (PM) identifying data, essentially fingerprints, DNA dental, collected in order be compared equivalent Antemortem (AM) data related missing persons list. Although there are solutions used field identification, they...

10.3389/fbloc.2020.00034 article EN cc-by Frontiers in Blockchain 2020-08-07

Obesity is considered one of the leading causes chronic and noncommunicable diseases; these include diabetes, cardiovascular disease, cancer. The obesity prevalence threefold higher in Arab Gulf Cooperation Council (GCC) population than rest world leaves healthcare providers within region with no alternative to offer continuous sustainable services. prevention would be more economical for governments providing treatment. Preventing challenging because it requires motivating individuals live...

10.3389/fbloc.2021.654539 article EN cc-by Frontiers in Blockchain 2021-07-12

Enabling Patient-Centred (PC) care in modern healthcare requires the flow of medical information with patient between different providers as they follow patient's treatment plan. However, PC threatens stability balance security support systems since legacy fall short attaining a when sharing their due to compromises made its availability, integrity, and confidentiality. Results show that main reason for this is implementation discrete focused mainly on confidentiality integrity leaving...

10.3233/978-1-61499-289-9-812 article EN Studies in health technology and informatics 2013-01-01

An emerging healthcare delivery model is enabling a new era of clinical care based on well-informed decision-making processes. Current information systems (HISs) fall short adopting this due to conflict between security needed implement the and those already enforced locally support traditional models. Meanwhile, in recent times, sector has shown substantial interest potential using blockchain technology for providing quality patients. No solution proposed so far fully addressed...

10.32604/cmc.2021.016618 article EN Computers, materials & continua/Computers, materials & continua (Print) 2021-01-01

A country's digital health maturity is a key factor in the transformation of national system. Although many assessment models exist literature, they perform as stand-alone tools without clear indication to inform strategy implementation health. This study explores dynamics between assessments and First, it analyses word token distribution concepts indicators from five pre-existing those originated WHO's Global Strategy on Digital Health. Second, compares type distributions selected topics...

10.3233/shti230477 article EN cc-by-nc Studies in health technology and informatics 2023-06-29

Cloud computing utilizes massive virtualized data centers which consume a large amount of energy. providers need to reduce the energy consumption cloud while delivering user requests with high Quality Service (QoS) according terms in Service-Level Agreement (SLA). This paper introduces genetic algorithm for resource allocation (GARA) that reduces SLA Violations (SLAVs) and manages consumption. Simulation experiments based on real workload show GARA successfully minimized SLAVs maintaining at...

10.1109/icumt.2017.8255166 article EN 2017-11-01

e-Government services require intensive information exchange and interconnection among governmental agencies to provide specialized online allow informed decision-making. This could compromise the integrity, confidentiality, and/or availability of being exchanged. Government are accountable liable for protection they possess use on a least privilege security principle basis even after dissemination. However, traditional access control models short achieving this as do not dynamic unknown...

10.14569/ijacsa.2018.090847 article EN International Journal of Advanced Computer Science and Applications 2018-01-01
Coming Soon ...