Your browser doesn't support javascript.
loading
Show: 20 | 50 | 100
Results 1 - 6 de 6
Filter
Add more filters










Database
Language
Publication year range
1.
Biomed Res Int ; 2022: 4339054, 2022.
Article in English | MEDLINE | ID: mdl-35386303

ABSTRACT

Method: This study was conducted according to Arksey and O'Malley's framework. To investigate the evidence on the effects of Kinect-based rehabilitation, a search was executed in five databases (Web of Science, PubMed, Cochrane Library, Scopus, and IEEE) from 2010 to 2020. Results: Thirty-three articles were finally selected by the inclusion criteria. Most of the studies had been conducted in the US (22%). In terms of the application of Kinect-based rehabilitation for stroke patients, most studies had focused on the rehabilitation of upper extremities (55%), followed by balance (27%). The majority of the studies had developed customized rehabilitation programs (36%) for the rehabilitation of stroke patients. Most of these studies had noted that the simultaneous use of Kinect-based rehabilitation and other physiotherapy methods has a more noticeable effect on performance improvement in patients. Conclusion: The simultaneous application of Kinect-based rehabilitation and other physiotherapy methods has a stronger effect on the performance improvement of stroke patients. Better effects can be achieved by designing Kinect-based rehabilitation programs tailored to the characteristics and abilities of stroke patients.


Subject(s)
Stroke Rehabilitation , Stroke , Humans , Stroke Rehabilitation/methods , Upper Extremity
2.
Acta Neurol Belg ; 122(2): 281-303, 2022 Apr.
Article in English | MEDLINE | ID: mdl-35060096

ABSTRACT

INTRODUCTION AND AIM: Multiple Sclerosis (MS) is a disease determined by inflammatory demyelination and neurodegeneration in the Central Nervous System (CNS). Despite the extensive utilization of Complementary and Alternative Medicine (CAM) in MS, there is a need to have comprehensive evidence regarding their application in the management of MS symptoms. This manuscript is a Systematic Literature Review and classification (SLR) of CAM therapies for the management of MS symptoms based on the International Classification of Functioning Disability and Health (ICF) model. METHOD: Studies published between 1990 and 2020 IN PubMed, Science Direct, Scopus, Pro-Quest, and Google Scholar using CAM therapies for the management of MS symptoms were analyzed. RESULTS: Thirty-one papers on the subject were analyzed and classified. The findings of this review clearly show that mindfulness, yoga, and reflexology were frequently used for managing MS symptoms. Moreover, most of the papers used mindfulness and yoga as a CAM therapy for the management of MS symptoms, which mostly devoted to mental functions such as fatigue, depression, cognition, neuromuscular functions such as gait, muscle strength, and spasticity, and sensory function such as balance, in addition to, reflexology is vastly used to management of mental functions of MS patients. CONCLUSION: Evidence suggested that CAM therapies in patients with MS have the potential to target and enhancement numerous elements outlined in the ICF model. Although the use of CAM therapies in MS symptom management is promising, there is a need for strict clinical trials. Future research direction should concentrate on methodologically powerful studies to find out the potential efficacy of CAM intervention.


Subject(s)
Complementary Therapies , Multiple Sclerosis , Fatigue/therapy , Gait , Humans , Multiple Sclerosis/therapy , Muscle Strength
3.
J Netw Comput Appl ; 174: 102886, 2021 Jan 15.
Article in English | MEDLINE | ID: mdl-34173428

ABSTRACT

In many countries, the Internet of Medical Things (IoMT) has been deployed in tandem with other strategies to curb the spread of COVID-19, improve the safety of front-line personnel, increase efficacy by lessening the severity of the disease on human lives, and decrease mortality rates. Significant inroads have been achieved in terms of applications and technology, as well as security which have also been magnified through the rapid and widespread adoption of IoMT across the globe. A number of on-going researches show the adoption of secure IoMT applications is possible by incorporating security measures with the technology. Furthermore, the development of new IoMT technologies merge with Artificial Intelligence, Big Data and Blockchain offers more viable solutions. Hence, this paper highlights the IoMT architecture, applications, technologies, and security developments that have been made with respect to IoMT in combating COVID-19. Additionally, this paper provides useful insights into specific IoMT architecture models, emerging IoMT applications, IoMT security measurements, and technology direction that apply to many IoMT systems within the medical environment to combat COVID-19.

5.
PLoS One ; 10(11): e0142716, 2015.
Article in English | MEDLINE | ID: mdl-26580963

ABSTRACT

Proxy Mobile IPv6 is a network-based localized mobility management protocol that supports mobility without mobile nodes' participation in mobility signaling. The details of user authentication procedure are not specified in this standard, hence, many authentication schemes have been proposed for this standard. In 2013, Chuang et al., proposed an authentication method for PMIPv6, called SPAM. However, Chuang et al.'s Scheme protects the network against some security attacks, but it is still vulnerable to impersonation and password guessing attacks. In addition, we discuss other security drawbacks such as lack of revocation procedure in case of loss or stolen device, and anonymity issues of the Chuang et al.'s scheme. We further propose an enhanced authentication method to mitigate the security issues of SPAM method and evaluate our scheme using BAN logic.


Subject(s)
Computer Communication Networks , Computer Security , Internet , Telemedicine , Cell Phone , Humans
6.
ScientificWorldJournal ; 2014: 260187, 2014.
Article in English | MEDLINE | ID: mdl-24701149

ABSTRACT

Cloud computing is a new generation of technology which is designed to provide the commercial necessities, solve the IT management issues, and run the appropriate applications. Another entry on the list of cloud functions which has been handled internally is Identity Access Management (IAM). Companies encounter IAM as security challenges while adopting more technologies became apparent. Trust Multi-tenancy and trusted computing based on a Trusted Platform Module (TPM) are great technologies for solving the trust and security concerns in the cloud identity environment. Single sign-on (SSO) and OpenID have been released to solve security and privacy problems for cloud identity. This paper proposes the use of trusted computing, Federated Identity Management, and OpenID Web SSO to solve identity theft in the cloud. Besides, this proposed model has been simulated in .Net environment. Security analyzing, simulation, and BLP confidential model are three ways to evaluate and analyze our proposed model.


Subject(s)
Computer Security/standards , Internet/standards , Trust , Biometric Identification/standards , Biometric Identification/trends , Computer Security/trends , Humans , Information Storage and Retrieval/standards , Information Storage and Retrieval/trends , Internet/trends
SELECTION OF CITATIONS
SEARCH DETAIL
...