Publications by authors named "Mehdi Sookhak"

Myocarditis is the form of an inflammation of the middle layer of the heart wall which is caused by a viral infection and can affect the heart muscle and its electrical system. It has remained one of the most challenging diagnoses in cardiology. Myocardial is the prime cause of unexpected death in approximately 20% of adults less than 40 years of age.

View Article and Find Full Text PDF

The ever-evolving and contagious nature of the Coronavirus (COVID-19) has immobilized the world around us. As the daily number of infected cases increases, the containment of the spread of this virus is proving to be an overwhelming task. Healthcare facilities around the world are overburdened with an ominous responsibility to combat an ever-worsening scenario.

View Article and Find Full Text PDF

With the rapid development of ICT, the present world is experiencing rapid changes in the field of education. Implementation of e-learning and ICT in the education system could allow teachers to upgrade and improve their lectures. However, from the perspective of value co-creation behavior in learning communities, conventional learning and e-learning classrooms may encounter different opportunities and challenges.

View Article and Find Full Text PDF

Wireless sensor networks (WSNs) are ubiquitous and pervasive, and therefore; highly susceptible to a number of security attacks. Denial of Service (DoS) attack is considered the most dominant and a major threat to WSNs. Moreover, the wormhole attack represents one of the potential forms of the Denial of Service (DoS) attack.

View Article and Find Full Text PDF

Cloud computing is a significant shift of computational paradigm where computing as a utility and storing data remotely have a great potential. Enterprise and businesses are now more interested in outsourcing their data to the cloud to lessen the burden of local data storage and maintenance. However, the outsourced data and the computation outcomes are not continuously trustworthy due to the lack of control and physical possession of the data owners.

View Article and Find Full Text PDF