Wail M. Omar

Learn More
AIM This prospective study is focused on the assessment of tumour response in a group of 28 bone sarcoma patients using (99m)Tc-MIBI scintigraphy. METHODS The quantitative changes in MIBI uptake before and after chemotherapy were measured and associated with the pathological evaluation of the degree of tumour necrosis. Besides this, another group of 40(More)
A s providers, insurers, and users look for ways to manage the costs of high-quality healthcare, they naturally look toward IT for solutions. But the extremely decentralized and fractured nature of healthcare services makes it difficult to develop a single IT system to serve all needs. Such a situation, however, is an ideal test case for service-oriented(More)
Twenty-five patients with malignant astrocytoma, either postoperatively (15 cases) or with recurrent tumour versus gliosis (10 cases) were included in this study. 201Tl single photon emission computed tomography (SPECT) was performed with the calculation of early and delayed uptake values and retention index. A high mean value of early and delayed uptake(More)
Accepting recent proposals to supporting dependable e-health enterprise systems via the adoption of emerging autonomic grid computing and services-oriented architecture (SOA); this paper presents the motivations for a novel semantics/knowledge plane for a service-oriented e-health middleware and applications. The paper starts by a detailed description of a(More)
With the increased number of new diseases that are appearing in the world, such as swine flu [influenza A(H1N1)], and the increased awareness of the importance of sharing medical ideas, information, experience, knowledge, and research results, there is an urgent demand for a collaboration framework. Such a framework depends on deploying, discovering, and(More)
Situated autonomic computing requires systems to possess and/or be able to access feedback and context information, from their environment, including instrumentation and sensor data. This paper presents the motivation and development details of a sensor and actuator framework, together with its associated description language, developed for widely(More)
The next generation software applications will be required to run on globally distributed heterogeneous assemblies of disparate resources including emerging computing grids. Such applications call for seamless integration and interoperation between varieties of service standards and architectures developed and deployed using existing service middleware(More)
This paper proposes a new technique for malicious object detec-tion and identification. The technique is based on a concept of vi-rus inquiry. The inquiry is an activity that is performed by the malicious object during its initiation. The malicious object uses this activity to ensure its uniqueness in memory. The inquiry can be regarded as a common behavior(More)