Wail M. Omar

Learn More
A s providers, insurers, and users look for ways to manage the costs of high-quality healthcare, they naturally look toward IT for solutions. But the extremely decentralized and fractured nature of healthcare services makes it difficult to develop a single IT system to serve all needs. Such a situation, however, is an ideal test case for service-oriented(More)
Twenty-five patients with malignant astrocytoma, either postoperatively (15 cases) or with recurrent tumour versus gliosis (10 cases) were included in this study. 201Tl single photon emission computed tomography (SPECT) was performed with the calculation of early and delayed uptake values and retention index. A high mean value of early and delayed uptake(More)
Accepting recent proposals to supporting dependable e-health enterprise systems via the adoption of emerging autonomic grid computing and services-oriented architecture (SOA); this paper presents the motivations for a novel semantics/knowledge plane for a service-oriented e-health middleware and applications. The paper starts by a detailed description of a(More)
With the increased number of new diseases that are appearing in the world, such as swine flu [influenza A(H1N1)], and the increased awareness of the importance of sharing medical ideas, information, experience, knowledge, and research results, there is an urgent demand for a collaboration framework. Such a framework depends on deploying, discovering, and(More)
Situated autonomic computing requires systems to possess and/or be able to access feedback and context information, from their environment, including instrumentation and sensor data. This paper presents the motivation and development details of a sensor and actuator framework, together with its associated description language, developed for widely(More)
The next generation software applications will be required to run on globally distributed heterogeneous assemblies of disparate resources including emerging computing grids. Such applications call for seamless integration and interoperation between varieties of service standards and architectures developed and deployed using existing service middleware(More)
This paper proposes a new technique for malicious object detec-tion and identification. The technique is based on a concept of vi-rus inquiry. The inquiry is an activity that is performed by the malicious object during its initiation. The malicious object uses this activity to ensure its uniqueness in memory. The inquiry can be regarded as a common behavior(More)