World Scientific
  • Search
  •   
Skip main navigation

Cookies Notification

We use cookies on this site to enhance your user experience. By continuing to browse the site, you consent to the use of our cookies. Learn More
×

System Upgrade on Tue, May 28th, 2024 at 2am (EDT)

Existing users will be able to log into the site and access content. However, E-commerce and registration of new users may not be available for up to 12 hours.
For online purchase, please visit us again. Contact us at [email protected] for any enquiries.

Novel Federated Decision Making for Distribution of Anti-SARS-CoV-2 Monoclonal Antibody to Eligible High-Risk Patients

    https://doi.org/10.1142/S021962202250050XCited by:17 (Source: Crossref)

    Context: When the epidemic first broke out, no specific treatment was available for severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2). The urgent need to end this unusual situation has resulted in many attempts to deal with SARS-CoV-2. In addition to several types of vaccinations that have been created, anti-SARS-CoV-2 monoclonal antibodies (mAbs) have added a new dimension to preventative and treatment efforts. This therapy also helps prevent severe symptoms for those at a high risk. Therefore, this is one of the most promising treatments for mild to moderate SARS-CoV-2 cases. However, the availability of anti-SARS-CoV-2 mAb therapy is limited and leads to two main challenges. The first is the privacy challenge of selecting eligible patients from the distribution hospital networking, which requires data sharing, and the second is the prioritization of all eligible patients amongst the distribution hospitals according to dose availability. To our knowledge, no research combined the federated fundamental approach with multicriteria decision-making methods for the treatment of SARS-COV-2, indicating a research gap. Objective: This paper presents a unique sequence processing methodology that distributes anti-SARS-CoV-2 mAbs to eligible high-risk patients with SARS-CoV-2 based on medical requirements by using a novel federated decision-making distributor. Method: This paper proposes a novel federated decision-making distributor (FDMD) of anti-SARS-CoV-2 mAbs for eligible high-risk patients. FDMD is implemented on augmented data of 49,152 cases of patients with SARS-CoV-2 with mild and moderate symptoms. For proof of concept, three hospitals with 16 patients each are enrolled. The proposed FDMD is constructed from the two sides of claim sequencing: central federated server (CFS) and local machine (LM). The CFS includes five sequential phases synchronised with the LMs, namely, the preliminary criteria setting phase that determines the high-risk criteria, calculates their weights using the newly formulated interval-valued spherical fuzzy and hesitant 2-tuple fuzzy-weighted zero-inconsistency (IVSH2-FWZIC), and allocates their values. The subsequent phases are federation, dose availability confirmation, global prioritization of eligible patients and alerting the hospitals with the patients most eligible for receiving the anti-SARS-CoV-2 mAbs according to dose availability. The LM independently performs all local prioritization processes without sharing patients’ data using the provided criteria settings and federated parameters from the CFS via the proposed Federated TOPSIS (F-TOPSIS). The sequential processing steps are coherently performed at both sides. Results and Discussion: (1) The proposed FDMD efficiently and independently identifies the high-risk patients most eligible for receiving anti-SARS-CoV-2 mAbs at each local distribution hospital. The final decision at the CFS relies on the indexed patients’ score and dose availability without sharing the patients’ data. (2) The IVSH2-FWZIC effectively weighs the high-risk criteria of patients with SARS-CoV-2. (3) The local and global prioritization ranks of the F-TOPSIS for eligible patients are subjected to a systematic ranking validated by high correlation results across nine scenarios by altering the weights of the criteria. (4) A comparative analysis of the experimental results with a prior study confirms the effectiveness of the proposed FDMD. Conclusion: The proposed FDMD has the benefits of centrally distributing anti-SARS-CoV-2 mAbs to high-risk patients prioritized based on their eligibility and dose availability, and simultaneously protecting their privacy and offering an effective cure to prevent progression to severe SARS-CoV-2 hospitalization or death.

    References

    • 1. Y. A. Helmy et al., The COVID-19 pandemic: A comprehensive review of taxonomy, genetics, epidemiology, diagnosis, treatment, and control, Journal of Clinical Medicine 9(4) (2020) 1–29. Crossref, Web of ScienceGoogle Scholar
    • 2. S. Pervaiz et al., A systematic literature review on particle swarm optimization techniques for medical diseases detection, Computational and Mathematical Methods in Medicine 2021 (2021) 10. Crossref, Web of ScienceGoogle Scholar
    • 3. A. S. Albahri et al., Role of biological data mining and machine learning techniques in detecting and diagnosing the novel coronavirus (COVID-19): A systematic review, Journal of Medical Systems 44(7) (2020) 1–11. Crossref, Web of ScienceGoogle Scholar
    • 4. A. Albahri et al., Multi-biological laboratory examination framework for the prioritization of patients with COVID-19 based on integrated AHP and group VIKOR methods, International Journal of Information Technology & Decision Making 19(5) (2020) 1247–1269. Link, Web of ScienceGoogle Scholar
    • 5. O. Albahri et al., Systematic review of artificial intelligence techniques in the detection and classification of COVID-19 medical images in terms of evaluation and benchmarking: Taxonomy analysis, challenges, future solutions and methodological aspects, Journal of Infection and Public Health 13(10) (2020) 1381–1396. Crossref, Web of ScienceGoogle Scholar
    • 6. O. Albahri et al., Helping doctors hasten COVID-19 treatment: Towards a rescue framework for the transfusion of best convalescent plasma to the most critical patients based on biological requirements via ml and novel MCDM methods, Computer Methods and Programs in Biomedicine 196 (2020) 105617. Crossref, Web of ScienceGoogle Scholar
    • 7. A. Alamoodi et al., Sentiment analysis and its applications in fighting COVID-19 and infectious diseases: A systematic review, Expert Systems with Applications 167 (2020) 114155. Crossref, Web of ScienceGoogle Scholar
    • 8. A. Albahri and R. A. Hamid , Detection-based prioritisation: Framework of multi-laboratory characteristics for asymptomatic COVID-19 carriers based on integrated entropy–TOPSIS methods, Artificial Intelligence in Medicine 111 (2020) 101983. Crossref, Web of ScienceGoogle Scholar
    • 9. M. A. Alsalem et al., Rise of multiattribute decision–making in combating COVID-19: A systematic review of the state-of-the-art literature, International Journal of Intelligent Systems (2021). Web of ScienceGoogle Scholar
    • 10. A. Mohsin et al., PSO–Blockchain-based image steganography: Towards a new method to secure updating and sharing COVID-19 data in decentralised hospitals intelligence architecture, Multimedia Tools and Applications 80(9) (2021) 14137–14161. Crossref, Web of ScienceGoogle Scholar
    • 11. T. J. Mohammed et al., Convalescent-plasma-transfusion intelligent framework for rescuing COVID-19 patients across centralised/decentralised telemedicine hospitals based on AHP-group TOPSIS and matching component, Applied Intelligence 51 (2021) 1–32. Crossref, Web of ScienceGoogle Scholar
    • 12. M. Alsalem et al., Based on T-spherical fuzzy environment: A combination of FWZIC and FDOSM for prioritising COVID-19 vaccine dose recipients, Journal of Infection and Public Health (2021). Crossref, Web of ScienceGoogle Scholar
    • 13. S. Garfan et al., Telehealth utilization during the Covid-19 pandemic: A systematic review, Computers in Biology and Medicine 138 (2021) 104878. Crossref, Web of ScienceGoogle Scholar
    • 14. A. H. Alamoodi, et al., Multi-perspectives systematic review on the applications of sentiment analysis for vaccine hesitancy, Computers in Biology and Medicine (2021) 1–18. Web of ScienceGoogle Scholar
    • 15. O. S. Albahri, et al., Novel dynamic fuzzy decision-making framework for COVID-19 vaccine dose recipients, Journal of Advanced Research (2021) 147–168. Web of ScienceGoogle Scholar
    • 16. M. Alsalem et al., Rescuing emergency cases of COVID-19 patients: An intelligent real-time MSC transfusion framework based on multicriteria decision-making methods, Applied Intelligence 52 (2022) 1–25. Crossref, Web of ScienceGoogle Scholar
    • 17. M. Alsalem et al., Multi-criteria decision-making for coronavirus disease 2019 applications: A theoretical analysis review, Artificial Intelligence Review 126 (2022) 1–84. Google Scholar
    • 18. A. S. Albahri et al., Integration of fuzzy-weighted zero-inconsistency and fuzzy decision by opinion score methods under a q-rung orthopair environment: A distribution case study of COVID-19 vaccine doses, Computer Standards & Interfaces 80 (2021) 103572. Crossref, Web of ScienceGoogle Scholar
    • 19. W. H. Bangyal et al., Detection of fake news text classification on COVID-19 using deep learning approaches, Computational and Mathematical Methods in Medicine 2021 (2021) 1–18. Crossref, Web of ScienceGoogle Scholar
    • 20. S. L. J. Li, G. F. Gao and W. Shi , The emergence, genomic diversity and global spread of SARS-CoV-2, Nature (2021). Crossref, Web of ScienceGoogle Scholar
    • 21. R. M. Burgos et al., The race to a COVID-19 vaccine: Opportunities and challenges in development and distribution, Drugs Context 10 (2021) 1–12. CrossrefGoogle Scholar
    • 22. C. Chakraborty et al., From COVID-19 to cancer mRNA vaccines: Moving from bench to clinic in the vaccine landscape, Frontiers in Immunology 12 (2021) 1–17. Crossref, Web of ScienceGoogle Scholar
    • 23. E. Chigutsa et al., Population pharmacokinetics and pharmacodynamics of the neutralizing antibodies bamlanivimab and etesevimab in patients with mild to moderate COVID-19 infection, Journal of Clinical Pharmacy and Therapeutics 110(5) (2021) 1302–1310. Crossref, Web of ScienceGoogle Scholar
    • 24. M. Dougan et al., Bamlanivimab plus etesevimab in mild or moderate Covid-19, NEJM 385(15) (2021) 1382–1392. Crossref, Web of ScienceGoogle Scholar
    • 25. S. M. Pinna et al., Monoclonal antibodies for the treatment of COVID-19 patients: An umbrella to overcome the storm? International Immunopharmacology 101 (2021) 108200. Crossref, Web of ScienceGoogle Scholar
    • 26. A. Aleem, O. Olarewaju and A. J. S. Pozun, Evaluating and referring patients for outpatient monoclonal antibody therapy for coronavirus (COVID-19) in the emergency department. (2021). Google Scholar
    • 27. T. J. Bollyky, L. O. Gostin and M. A. Hamburg , The equitable distribution of COVID-19 therapeutics and vaccines. Jama 323(24) (2020) 2462–2463. Crossref, Web of ScienceGoogle Scholar
    • 28. G. Persad, M. E. Peek and E. J. Emanuel , Fairly prioritizing groups for access to COVID-19 vaccines, Jama 324(16) (2020) 1601–1602. Crossref, Web of ScienceGoogle Scholar
    • 29. F. Lega , Strategies for multi-hospital networks: A framework, Health Services Management Research 18(2) (2005) 86–99. CrossrefGoogle Scholar
    • 30. A. H. Association, Fast facts on US hospitals (2014). Google Scholar
    • 31. D. Shalev and P. A. Shapiro , Epidemic psychiatry: The opportunities and challenges of COVID-19, General Hospital Psychiatry 64 (2020) 68. Crossref, Web of ScienceGoogle Scholar
    • 32. A. S. Albahri, et al., Based multiple heterogeneous wearable sensors: A smart real-time health monitoring structured for hospitals distributor, IEEE Access 7 (2019) 37269–37323. Crossref, Web of ScienceGoogle Scholar
    • 33. M. A. Azad et al., A first look at privacy analysis of COVID-19 contact tracing mobile applications, IEEE Internet of Things Journal (2020). Web of ScienceGoogle Scholar
    • 34. S. Dispinseri et al., Neutralizing antibody responses to SARS-CoV-2 in symptomatic COVID-19 is persistent and critical for survival, Nature Communications 12(1) (2021) 2670. Crossref, Web of ScienceGoogle Scholar
    • 35. A. Zaidan et al., Novel approach for high (secure and rate) data hidden within triplex space for executable file, Scientific Research and Essays 5(15) (2010) 1965–1977. Google Scholar
    • 36. H. O. Alanazi et al., Secure topology for electronic medical record transmissions, International Journal of Pharmacology 6(6) (2010) 954–958. Crossref, Web of ScienceGoogle Scholar
    • 37. M. S. A. Nabi et al., Suitability of using SOAP protocol to secure electronic medical record databases transmission, International Journal of Pharmacology 6(6) (2010) 959–964. Crossref, Web of ScienceGoogle Scholar
    • 38. A. Naji et al., Novel approach for cover file of hidden data in the unused area two within EXE file using distortion techniques and advance encryption standard, Proceeding of World Academy of Science Engineering and Technology (WASET) 56(5) (2010) 498–502. Google Scholar
    • 39. A. Naji et al., Novel framework for hidden data in the image page within executable file using computation between advanced encryption standard and distortion techniques, arXiv preprint arXiv:0908.0216, 2009. Google Scholar
    • 40. B. Zaidan et al., On the differences between hiding information and cryptography techniques: An overview, Journal of Applied Sciences 10(15) (2010) 1650–1655. CrossrefGoogle Scholar
    • 41. A. K. Hmood et al., An overview on hiding information technique in images, Journal of Applied Sciences 10(18) (2010) 2094–2100. CrossrefGoogle Scholar
    • 42. A. Hamdan et al., New frame work of hidden data with in non multimedia file, International Journal of Computer Network and Security 2(1) (2010) 46–54. Google Scholar
    • 43. H. A. Jalab, A. Zaidan and B. Zaidan , New design for information hiding with in steganography using distortion techniques, International Journal of Engineering and Technology 2(1) (2010) 72. CrossrefGoogle Scholar
    • 44. M. Nabi et al., Suitability of SOAP protocol in securing transmissions of EMR database, International Journal of Pharmacology 6(6) (2010) 959–964. Crossref, Web of ScienceGoogle Scholar
    • 45. G. M. Alam et al., Using the features of mosaic image and AES cryptosystem to implement an extremely high rate and high secure data hidden: Analytical study, Scientific Research and Essays 5(21) (2010) 3254–3260. Google Scholar
    • 46. A. K. Hmood et al., On the accuracy of hiding information metrics: Counterfeit protection for education and important certificates, International Journal of the Physical Sciences 5(7) (2010) 1054–1062. Google Scholar
    • 47. Z. K. Al-Ani et al., Overview: Main fundamentals for steganography, arXiv preprint arXiv:1003.4086, 2010. Google Scholar
    • 48. B. Zaidan, A. Zaidan and M. Mat Kiah , Impact of data privacy and confidentiality on developing telemedicine applications: A review participates opinion and expert concerns, International Journal of Pharmacology 7(3) (2011) p. 382–387. Crossref, Web of ScienceGoogle Scholar
    • 49. Y. Salem et al., A review on multimedia communications cryptography, Research Journal of Information Technology 3(3) (2011) 146–152. CrossrefGoogle Scholar
    • 50. A. Medani et al., Review of mobile short message service security issues and techniques towards the solution, Scientific Research and Essays 6(6) (2011) 1147–1165. Google Scholar
    • 51. M. Abomhara et al., An experiment of scalable video security solution using H. 264/AVC and advanced encryption standard (AES): Selective cryptography, International Journal of the Physical Sciences 6(16) (2011) 4053–4063. Google Scholar
    • 52. M. M. Kiah et al., A review of audio based steganography and digital watermarking, International Journal of Physical Sciences 6(16) (2011) 3837–3850. Google Scholar
    • 53. B. Zaidan et al., A security framework for nationwide health information exchange based on telehealth strategy, Journal of Medical Systems 39(5) (2015) 1–19. Crossref, Web of ScienceGoogle Scholar
    • 54. A. Zaidan et al., Challenges, alternatives, and paths to sustainability: Better public health promotion using social networking pages as key tools, Journal of Medical Systems 39(2) (2015) 1–14. Crossref, Web of ScienceGoogle Scholar
    • 55. A. A. Zaidan et al., A survey on communication components for IoT-based technologies in smart homes, Telecommunication Systems 69(1) (2018) 1–25. Crossref, Web of ScienceGoogle Scholar
    • 56. M. Hussain et al., Conceptual framework for the security of mobile health applications on android platform, Telematics and Informatics 35(5) (2018) 1335–1354. Crossref, Web of ScienceGoogle Scholar
    • 57. A. H. Ali et al., High capacity, transparent and secure audio steganography model based on fractal coding and chaotic map in temporal domain, Multimedia Tools and Applications 77(23) (2018) 31487–31516. Crossref, Web of ScienceGoogle Scholar
    • 58. A. Mohsin et al., Real-time remote health monitoring systems using body sensor information and finger vein biometric verification: A multi-layer systematic review, Journal of Medical Systems 42(12) (2018) 1–36. Crossref, Web of ScienceGoogle Scholar
    • 59. A. Mohsin et al., Real-time medical systems based on human biometric steganography: A systematic review, Journal of Medical Systems 42(12) (2018) 1–20. Crossref, Web of ScienceGoogle Scholar
    • 60. H. M. Hussien et al., A systematic review for enabling of develop a blockchain technology in healthcare application: Taxonomy, substantially analysis, motivations, challenges, recommendations and future direction, Journal of Medical Systems 43(10) (2019) 1–35. Crossref, Web of ScienceGoogle Scholar
    • 61. A. Aleesa et al., Review of intrusion detection systems based on deep learning techniques: coherent taxonomy, challenges, motivations, recommendations, substantial analysis and future directions, Neural Computing and Applications 32(14) (2020) 9827–9858. Crossref, Web of ScienceGoogle Scholar
    • 62. A. Mohsin et al., Finger vein biometrics: Taxonomy analysis, open challenges, future directions, and recommended solution for decentralised network architectures, IEEE Access 8: (2020) 9821–9845. Crossref, Web of ScienceGoogle Scholar
    • 63. M. L. Shuwandy, et al., mHealth authentication approach based 3D touchscreen and microphone sensors for real-time remote healthcare monitoring system: comprehensive review, open issues and methodological aspects, Computer Science Review 38 (2020) 100300. Crossref, Web of ScienceGoogle Scholar
    • 64. F. Binbeshr et al., A systematic review of PIN-entry methods resistant to shoulder-surfing attacks, Computers & Security 101 (2021) 102116. Crossref, Web of ScienceGoogle Scholar
    • 65. A. Naji, A. Zaidan and B. Zaidan , Challenges of hidden data in the unused area two within executable files, Journal of Computer Science 5(11) (2009) 890. CrossrefGoogle Scholar
    • 66. A. Taqa, A. Zaidan and B. Zaidan , New framework for high secure data hidden in the MPEG using AES encryption algorithm, International Journal of Computer and Electrical Engineering 1(5) (2009) 1793–8163. Google Scholar
    • 67. B. Zaidan et al., Stego-image vs stego-analysis system, International Journal of Computer and Electrical Engineering 1(5) (2009) 572. CrossrefGoogle Scholar
    • 68. H. Jalab, A. Zaidan and B. Zaidan, Frame selected approach for hiding data within MPEG video using bit plane complexity segmentation, arXiv preprint arXiv:0912.3986, 2009. Google Scholar
    • 69. A. Zaidan et al., Investigate the capability of applying hidden data in text file: An overview, Journal of Applied Sciences 10(17) (2010) 1916–1922. CrossrefGoogle Scholar
    • 70. A. Al-Frajat et al., Hiding data in video file: An overview, Journal of Applied Sciences 10(15) (2010) 1644–1649. CrossrefGoogle Scholar
    • 71. A. K. Hmood et al., On the capacity and security of steganography approaches: An overview, Journal of Applied Sciences 10(16) (2010) 1825–1833. CrossrefGoogle Scholar
    • 72. M. A. Ahmed et al., A novel embedding method to increase capacity and robustness of low-bit encoding audio steganography technique using noise gate software logic algorithm, Journal of Applied Sciences 10(1) (2010) 59–64. CrossrefGoogle Scholar
    • 73. R. Islam et al., New system for secure cover file of hidden data in the image page within executable file using statistical steganography techniques, arXiv preprint arXiv:1002.2416, 2010. Google Scholar
    • 74. H. Alanazi et al., New comparative study between DES, 3DES and AES within nine factors, arXiv preprint arXiv:1003.4085, 2010. Google Scholar
    • 75. H. Alanazi et al., New classification methods for hiding information into two parts: Multimedia files and non multimedia files, arXiv preprint arXiv:1003.4084, 2010. Google Scholar
    • 76. A. Zaidan, B. Zaidan and H. A. Jalab , A new system for hiding data within (unused area two+ image page) of portable executable file using statistical technique and advance encryption standard, International Journal of Computer Theory and Engineering 2(2) (2010) 218. CrossrefGoogle Scholar
    • 77. M. Abomhara et al., Enhancing selective encryption for H. 264/AVC using advanced encryption standard, arXiv preprint arXiv:2201.03391, 2022. Google Scholar
    • 78. B. Zaidan et al., Towards corrosion detection system, International Journal of Computer Science Issues (IJCSI) 7(3) (2010) 46. Google Scholar
    • 79. A.-N. Yahya et al., A new system for hidden data within header space for EXE-File using object oriented technique, in 2010 3rd Int. Conf. Computer Science and Information Technology (IEEE, 2010). Google Scholar
    • 80. A. Zaidan et al., Novel multi-cover steganography using remote sensing image and general recursion neural cryptosystem, International Journal of Physical Sciences 5(11) (2010) 1776–1786. Google Scholar
    • 81. B. Zaidan et al., StegoMos: A secure novel approach of high rate data hidden using mosaic image and ANN-BMP cryptosystem, International Journal of Physical Sciences 5(11) (2010) 1796–1806. Google Scholar
    • 82. H. O. Alanazi et al., Securing electronic medical records transmissions over unsecured communications: An overview for better medical governance, Journal of Medicinal Plants Research 4(19) (2010) 2059–2074. CrossrefGoogle Scholar
    • 83. M. Abomhara et al., Suitability of using symmetric key to secure multimedia data: An overview, Journal of Applied Sciences 10(15) (2010) 1656–1661. CrossrefGoogle Scholar
    • 84. S. H. Al-Bakri et al., Securing peer-to-peer mobile communications using public key cryptography: New security strategy, International Journal of the Physical Sciences 6(4) (2011) 930–938. Google Scholar
    • 85. M. Kiah et al., An enhanced security solution for electronic medical records based on AES hybrid technique with SOAP/XML and SHA-1, Journal of Medical Systems 37(5) (2013) 1–18. Crossref, Web of ScienceGoogle Scholar
    • 86. M. Watari, A. Zaidan, and B. Zaidan , Securing m-government transmission based on symmetric and asymmetric algorithms: A review, Asian Journal of Scientific Research 6(4) (2013) 632. CrossrefGoogle Scholar
    • 87. M. L. M. Kiah et al., Open source EMR software: Profiling, insights and hands-on analysis, Computer Methods and Programs in Biomedicine 117(2) (2014) 360–382. Crossref, Web of ScienceGoogle Scholar
    • 88. M. Mat Kiah et al., Design and develop a video conferencing framework for real-time telemedicine applications using secure group-based communication architecture, Journal of Medical Systems 38(10) (2014) 1–11. Crossref, Web of ScienceGoogle Scholar
    • 89. H. O. Alanazi et al., Meeting the security requirements of electronic medical records in the ERA of high-speed computing, Journal of Medical Systems 39(1) (2015) 1–13. Crossref, Web of ScienceGoogle Scholar
    • 90. S. Iqbal et al., Real-time-based E-health systems: Design and implementation of a lightweight key management protocol for securing sensitive information of patients, Health and Technology 9(2) (2019) 93–111. Crossref, Web of ScienceGoogle Scholar
    • 91. A. Mohsin et al., Blockchain authentication of network applications: Taxonomy, classification, capabilities, open challenges, motivations, recommendations and future directions, Computer Standards & Interfaces 64 (2019) 41–60. Crossref, Web of ScienceGoogle Scholar
    • 92. M. L. Shuwandy et al., Sensor-based mHealth authentication for real-time remote healthcare monitoring system: A multilayer systematic review, Journal of Medical Systems 43(2) (2019) 33. Crossref, Web of ScienceGoogle Scholar
    • 93. M. Talal et al., Smart home-based IoT for real-time and secure remote health monitoring of triage and priority system using body sensors: Multi-driven systematic review, Journal of Medical Systems 43(3) (2019) 42. Crossref, Web of ScienceGoogle Scholar
    • 94. A. Mohsin et al., Based medical systems for patient’s authentication: Towards a new verification secure framework using CIA standard, Journal of Medical Systems 43(7) (2019) 1–34. Crossref, Web of ScienceGoogle Scholar
    • 95. A. Mohsin et al., Based blockchain-PSO-AES techniques in finger vein biometrics: A novel verification secure framework for patient authentication, Computer Standards & Interfaces 66 (2019) 103343. Crossref, Web of ScienceGoogle Scholar
    • 96. M. Hussain et al., The rise of keyloggers on smartphones: A survey and insight into motion-based tap inference attacks, Pervasive and Mobile Computing 25 (2016) 1–25. Crossref, Web of ScienceGoogle Scholar
    • 97. A. A. Zaidan et al., Novel approach for high secure and high rate data hidden in the image using image texture analysis, International Journal of Engineering and Technology 1(2) (2009) 63–69. Google Scholar
    • 98. S. A. W. J. U. Hasan, Interim statement on booster doses for COVID-19 vaccination, 4 (2021). Google Scholar
    • 99. M. D. O. Health , Ethical Framework for Allocation of Monoclonal Antibodies during the COVID-19 Pandemic (MN, USA, 2021), pp. 1–25. Google Scholar
    • 100. NIH, Updated COVID-19 treatment guidelines panel’s statement on the prioritization of anti-SARS-CoV-2 monoclonal antibodies for the treatment or prevention of SARS-CoV-2 infection when there are logistical or supply constraints, ed. N.I.O. Health (National Institutes of Health, USA, 2021). Google Scholar
    • 101. J. Rezaei , Best-worst multi-criteria decision-making method: Some properties and a linear model, Omega 64 (2016) 126–130. Crossref, Web of ScienceGoogle Scholar
    • 102. M. M. Salih, B. Zaidan and A. Zaidan , Fuzzy decision by opinion score method, Applied Soft Computing 96 (2020) 106595. Crossref, Web of ScienceGoogle Scholar
    • 103. K. Bonawitz et al., Towards federated learning at scale: System design, arXiv preprint arXiv:1902.01046, 2019. Google Scholar
    • 104. R. Qasim et al., A fine-tuned BERT-based transfer learning approach for text classification, Journal of Healthcare Engineering 2022 (2022). Crossref, Web of ScienceGoogle Scholar
    • 105. A. Vaid et al., Federated learning of electronic health records to improve mortality prediction in hospitalized patients with COVID-19: Machine learning approach, JMIR Medical Informatics 9(1) (2021) e24207. Crossref, Web of ScienceGoogle Scholar
    • 106. R. Kumar et al., Blockchain-federated-learning and deep learning models for covid-19 detection using ct imaging, IEEE Sensors Journal (2021). Crossref, Web of ScienceGoogle Scholar
    • 107. I. Feki et al., Federated learning for COVID-19 screening from Chest X-ray images, Applied Soft Computing 106 (2021) 107330. Crossref, Web of ScienceGoogle Scholar
    • 108. D. Yang et al., Federated semi-supervised learning for COVID region segmentation in chest CT using multi-national data from China, Italy, Japan, Medical Image Analysis 70 (2021) 101992. Crossref, Web of ScienceGoogle Scholar
    • 109. J. Pang et al., Collaborative city digital twin for the COVID-19 pandemic: A federated learning solution, Tsinghua Science and Technology 26(5) (2021) 759–771. Crossref, Web of ScienceGoogle Scholar
    • 110. L. Ouyang et al., A novel framework of collaborative early warning for COVID-19 based on blockchain and smart contracts, Information Sciences 570 (2021) 124–143. Crossref, Web of ScienceGoogle Scholar
    • 111. R. T. Mohammed , Determining importance of many-objective optimisation competitive algorithms evaluation criteria based on a novel fuzzy-weighted zero-consistency method, International Journal of Information Technology & Decision Making (2020). Web of ScienceGoogle Scholar
    • 112. O. S. Albahri et al., Multidimensional benchmarking of the active queue management methods of network congestion control based on extension of fuzzy decision by opinion score method, International Journal of Intelligent Systems 36(2) (2021) 796–831. Crossref, Web of ScienceGoogle Scholar
    • 113. A. Zaidan et al., Multi-criteria analysis for OS-EMR software selection problem: A comparative study, Decision Support Systems 78(4) (2015) 15–27. Crossref, Web of ScienceGoogle Scholar
    • 114. B. N. Abdullateef et al., An evaluation and selection problems of OSS-LMS packages, SpringerPlus 5(1) (2016) 248–255. CrossrefGoogle Scholar
    • 115. Q. M. Yas et al., Towards on develop a framework for the evaluation and benchmarking of skin detectors based on artificial intelligent models using multi-criteria decision-making techniques, International Journal of Pattern Recognition and Artificial Intelligence 31(03) (2017) 1759002. Link, Web of ScienceGoogle Scholar
    • 116. B. B. Zaidan, A. A. Zaidan, H. A. Karim and N. N. Ahmad , A new digital watermarking evaluation and benchmarking methodology using an external group of evaluators and multi-criteria analysis based on ‘large-scale data’, Software: Practice and Experience 47(10) (2017) 1365–1392. Crossref, Web of ScienceGoogle Scholar
    • 117. B. Zaidan and A. Zaidan , Software and hardware FPGA-based digital watermarking and steganography approaches: Toward new methodology for evaluation and benchmarking using multi-criteria decision-making techniques, Journal of Circuits, Systems and Computers 26(07) (2017) 1750116. Link, Web of ScienceGoogle Scholar
    • 118. B. B. Zaidan et al., A new approach based on multi-dimensional evaluation and benchmarking for data hiding techniques, International Journal of Information Technology & Decision Making (2017) 1–42. LinkGoogle Scholar
    • 119. R. Malik et al., Novel roadside unit positioning framework in the context of the vehicle-to-infrastructure communication system based on AHP—Entropy for weighting and borda—VIKOR for uniform ranking, International Journal of Information Technology & Decision Making 21 (2021) 1–34. Web of ScienceGoogle Scholar
    • 120. J. Zhang, G. Kou and Y. Zhang , Estimating priorities from relative deviations in pairwise comparison matrices, Information Sciences 552 (2021) 310–327, https://doi.org/10.1016/j.ins.2020.12.008. Crossref, Web of ScienceGoogle Scholar
    • 121. G. Kou, Y. Xu, Y. Peng, F. Shen, Y. Chen, K. Chang and S. Kou , Bankruptcy prediction for SMEs using transactional data and two-stage multiobjective feature selection, Decision Support Systems 140 (2021) 113429, https://doi.org/10.1016/j.dss.2020.113429. Crossref, Web of ScienceGoogle Scholar
    • 122. G. Kou, Ö. O. Akdeniz, H. Dinçer and S. Yüksel , Fintech investments in european banks: A hybrid it2 fuzzy multidimensional decision-making approach, Financial Innovation 39 (2021) 1–28, https://doi.org/10.1186/s40854-021-00256-y. Google Scholar
    • 123. T. Li, G. Kou, Y. Peng and P. S. Yu , An integrated cluster detection, optimization and interpretation approach for financial data, in IEEE Transactions on Cybernetics, https://doi.org/10.1109/TCYB.2021.3109066. Web of ScienceGoogle Scholar
    • 124. M. Qader et al., A methodology for football players selection problem based on multi-measurements criteria analysis, Measurement 111 (2017) 38–50. Crossref, Web of ScienceGoogle Scholar
    • 125. F. Jumaah, A. A. Zaidan, B. B. Zaidan et al., Technique for order performance by similarity to ideal solution for solving complex situations in multi-criteria optimization of the tracking channels of GPS baseband telecommunication receivers, Telecommun Syst 68 (2018) 425–443, https://doi.org/10.1007/s11235-017-0401-5. Crossref, Web of ScienceGoogle Scholar
    • 126. B. Rahmatullah et al., Multi-complex attributes analysis for optimum GPS baseband receiver tracking channels selection, in 2017 4th Int. Conf. Control, Decision and Information Technologies (CoDIT) (IEEE, 2017). CrossrefGoogle Scholar
    • 127. O. H. Salman et al., Novel methodology for triage and prioritizing using “big data” patients with chronic heart diseases through telemedicine environmental, 16(05) (2017) 1211–1245. Google Scholar
    • 128. Q. M. Yas et al., Comprehensive insights into evaluation and benchmarking of real-time skin detectors: Review, open issues & challenges, and recommended solutions, Measurement 114 (2018) 243–260. Crossref, Web of ScienceGoogle Scholar
    • 129. B. Zaidan and A. Zaidan , Comparative study on the evaluation and benchmarking information hiding approaches based multi-measurement analysis using TOPSIS method with different normalisation, separation and context techniques, Measurement 117 (2018) 277–294. Crossref, Web of ScienceGoogle Scholar
    • 130. N. Kalid et al., Based on real time remote health monitoring systems: A new approach for prioritization “large scales data” patients with chronic heart diseases using body sensors and communication technology, 42(4) (2018) 69. Google Scholar
    • 131. A. Zaidan et al., A review on smartphone skin cancer diagnosis apps in evaluation and benchmarking: coherent taxonomy, open issues and recommendation pathway solution, 8(4) (2018) 223–238. Google Scholar
    • 132. O. Albahri et al., Systematic review of real-time remote health monitoring system in triage and priority-based sensor technology: Taxonomy, open challenges, motivation and recommendations, Journal of Medical Systems 42(5) (2018) 80. Crossref, Web of ScienceGoogle Scholar
    • 133. M. Alsalem et al., Systematic review of an automated multiclass detection and classification system for acute Leukaemia in terms of evaluation and benchmarking, open challenges, issues and methodological aspects, 42(11) (2018) 204. Google Scholar
    • 134. A. S. Albahri et al., IoT-based telemedicine for disease prevention and health promotion: State-of-the-art, Journal of Network and Computer Applications 173 (2021) 102873. Crossref, Web of ScienceGoogle Scholar
    • 135. R. A. Hamid et al., How smart is e-tourism? A systematic review of smart tourism recommendation system applying data management, Computer Science Review 39 (2021) 100337. Crossref, Web of ScienceGoogle Scholar
    • 136. N. Kalid et al., Based real time remote health monitoring systems: A review on patients prioritization and related “big data” using body sensors information and communication technology, 42(2) (2018) 30. Google Scholar
    • 137. F. Jumaah et al., Decision-making solution based multi-measurement design parameter for optimization of GPS receiver tracking channels in static and dynamic real-time positioning multipath environment, 118 (2018) 83–95. Google Scholar
    • 138. A. Albahri et al., Real-time fault-tolerant mHealth system: Comprehensive review of healthcare services, opens issues, challenges and methodological aspects, Journal of Medical Systems 42(8) (2018) 137. Crossref, Web of ScienceGoogle Scholar
    • 139. O. Albahri et al., Real-time remote health-monitoring systems in a medical centre: A review of the provision of healthcare services-based body sensor information, open challenges and methodological aspects, Journal of Medical Systems 42(9) (2018) 164. Crossref, Web of ScienceGoogle Scholar
    • 140. O. Zughoul et al., Comprehensive insights into the criteria of student performance in various educational domains, IEEE Access 6(4) (2018) 73245–73264. Crossref, Web of ScienceGoogle Scholar
    • 141. M. M. Salih et al., Survey on fuzzy TOPSIS state-of-the-art between 2007 and 2017, Computers & Operations Research 104 (2019) 207–227. Crossref, Web of ScienceGoogle Scholar
    • 142. O. Albahri et al., Fault-tolerant mHealth framework in the context of IoT-based real-time wearable health data sensors, IEEE Access 7 (2019) 50052–50080. Crossref, Web of ScienceGoogle Scholar
    • 143. E. Almahdi et al., Mobile patient monitoring systems from a benchmarking aspect: Challenges, open issues and recommended solutions, Journal of Medical Systems 43(7) (2019) 207. Crossref, Web of ScienceGoogle Scholar
    • 144. M. Alsalem et al., Multiclass benchmarking framework for automated acute Leukaemia detection and classification based on BWM and group-VIKOR, Journal of Medical Systems 43(7) (2019) 212. Crossref, Web of ScienceGoogle Scholar
    • 145. E. Almahdi et al., Mobile-based patient monitoring systems: A prioritisation framework using multi-criteria decision-making techniques, Journal of Medical Systems 43(7) (2019) 219. Crossref, Web of ScienceGoogle Scholar
    • 146. K. Mohammed et al., Real-time remote-health monitoring systems: A review on patients prioritisation for multiple-chronic diseases, taxonomy analysis, concerns and solution procedure, Journal of Medical Systems 43(7) (2019) 223. Crossref, Web of ScienceGoogle Scholar
    • 147. M. Khatari et al., Multi-criteria evaluation and benchmarking for active queue management methods: Open issues challenges and recommended pathway solutions, International Journal of Information Technology & Decision Making 18(4) (2019) 1187–1242. Link, Web of ScienceGoogle Scholar
    • 148. S.-Y. Chou, Y.-H. Chang and C.-Y. Shen , A fuzzy simple additive weighting system under group decision-making for facility location selection with objective/subjective attributes, European Journal of Operational Research 189(1) (2008) 132–145. Crossref, Web of ScienceGoogle Scholar
    • 149. S. Önüt and S. Soner , Transshipment site selection using the AHP and TOPSIS approaches under fuzzy environment, Waste Management 28(9) (2008) 1552–1559. Crossref, Web of ScienceGoogle Scholar
    • 150. H. Karahalios , The application of the AHP-TOPSIS for evaluating ballast water treatment systems by ship operators, Transportation Research Part D: Transport and Environment 52(Part A) (2017) 172–184. Crossref, Web of ScienceGoogle Scholar
    • 151. M. Alaa et al., Assessment and ranking framework for the English skills of pre-service teachers based on fuzzy Delphi and TOPSIS methods, IEEE Access 7 (2019) 126201–126223. Crossref, Web of ScienceGoogle Scholar
    • 152. N. Ibrahim et al., Multi-criteria evaluation and benchmarking for young learners’ English language mobile applications in terms of LSRW skills, IEEE Access 7(7) (2019) 146620–146651. Crossref, Web of ScienceGoogle Scholar
    • 153. M. Talal et al., Comprehensive review and analysis of anti-malware apps for smartphones, Telecommunication Systems 72(2) (2019) 285–337. Crossref, Web of ScienceGoogle Scholar
    • 154. N. M. Napi et al., Medical emergency triage and patient prioritisation in a telemedicine environment: A systematic review, Health and Technology 9(5) (2019) 679–700. Crossref, Web of ScienceGoogle Scholar
    • 155. O. Enaizan et al., Electronic medical record systems: Decision support examination framework for individual, security and privacy concerns using multi-perspective analysis, Health and Technology 10(3) (2020) 795–822. Crossref, Web of ScienceGoogle Scholar
    • 156. A. Zaidan et al., Multi-agent learning neural network and Bayesian model for real-time IoT skin detectors: A new evaluation and benchmarking methodology, Neural Computing and Applications 32(12) (2020) 8315–8366. Crossref, Web of ScienceGoogle Scholar
    • 157. I. Tariq et al., MOGSABAT: A metaheuristic hybrid algorithm for solving multi-objective optimisation problems, Neural Computing and Applications 32 (2018). Google Scholar
    • 158. O. Zughoul , Novel triplex procedure for ranking the ability of software engineering students based on two levels of AHP and group TOPSIS techniques. International Journal of Information Technology & Decision Making, (2020). Web of ScienceGoogle Scholar
    • 159. K. H. Abdulkareem et al., A new standardisation and selection framework for real-time image dehazing algorithms from multi-foggy scenes based on fuzzy Delphi and hybrid multi-criteria decision analysis methods, Neural Computing and Applications (2020). Crossref, Web of ScienceGoogle Scholar
    • 160. K. Mohammed et al., Novel technique for reorganisation of opinion order to interval levels for solving several instances representing prioritisation in patients with multiple chronic diseases, 185 (2020) 105151. Google Scholar
    • 161. K. Mohammed et al., A uniform intelligent prioritisation for solving diverse and big data generated from multiple chronic diseases patients based on hybrid decision-making and voting method, 8 (2020) 91521–91530. Google Scholar
    • 162. A. Alamoodi et al., Machine learning-based imputation soft computing approach for large missing scale and non-reference data imputation, Chaos Solitons Fractals 151 (2021) 111236. Crossref, Web of ScienceGoogle Scholar
    • 163. A. Albahri et al., Based on the multi-assessment model: Towards a new context of combining the artificial neural network and structural equation modelling: A review, Chaos Solitons Fractals 153 (2021) 111445. Crossref, Web of ScienceGoogle Scholar
    • 164. T. Yang et al., Comprehensive ecological risk assessment for semi-arid basin based on conceptual model of risk response and improved TOPSIS model-a case study of Wei River Basin, China, Science of the Total Environment 719 (2020) 137502. Crossref, Web of ScienceGoogle Scholar
    • 165. M. Lin et al., Score function based on concentration degree for probabilistic linguistic term sets: an application to TOPSIS and VIKOR, Information Sciences 551 (2021) 270–290. Crossref, Web of ScienceGoogle Scholar
    • 166. X. Yu, X. Wu and T. Huo , Combine MCDM methods and PSO to evaluate economic benefits of high-tech zones in China, Sustainability 12(18) (2020) 7833. Crossref, Web of ScienceGoogle Scholar
    • 167. Z. Ding et al., An integrated decision-making method for selecting machine tool guideways considering remanufacturability, International Journal of Computer Integrated Manufacturing 33(7) (2020) 686–700. Crossref, Web of ScienceGoogle Scholar
    • 168. Y. Zhao et al., Complementarity evaluation index system and method of multiple power sources, in 2020 IEEE 3rd Student Conf. Electrical Machines and Systems (SCEMS) (IEEE, 2020). CrossrefGoogle Scholar
    • 169. Y. Deng et al., Thermo-chemical water splitting: Selection of priority reversible redox reactions by multi-attribute decision making, Renewable Energy 170 (2021) 800–810. Crossref, Web of ScienceGoogle Scholar
    • 170. L. Wang et al., FMEA-CM based quantitative risk assessment for process industries — A case study of coal-to-methanol plant in China, Process Safety and Environmental Protection 149 (2021) 299–311. Crossref, Web of ScienceGoogle Scholar
    • 171. A. K. Singh et al., A fuzzy-AHP and M-TOPSIS based approach for selection of composite materials used in structural applications, Materials Today: Proceedings 26 (2020) 3119–3123. CrossrefGoogle Scholar
    • 172. L. Lv et al., A multi-objective decision-making method for machining process plan and an application, Journal of Cleaner Production 260 (2020) 121072. Crossref, Web of ScienceGoogle Scholar
    • 173. X. Zhang, J. Lu, and Y. Peng , Hybrid MCDM model for location of logistics hub: A case in China under the belt and road initiative, IEEE Access 9 (2021) 41227–41245. Crossref, Web of ScienceGoogle Scholar
    • 174. J. Liu et al., A performance evaluation framework of electricity markets in China, in 2020 5th Asia Conf. Power and Electrical Engineering (ACPEE) (IEEE, 2020). CrossrefGoogle Scholar
    • 175. H. Tang and F. Fang , A novel improvement on rank reversal in TOPSIS based on the efficacy coefficient method, International Journal of Internet Manufacturing and Services 5(1) (2018) 67–84. CrossrefGoogle Scholar
    • 176. A. Zaidan et al., Novel multiperspective hiring framework for the selection of software programmer applicants based on AHP and group TOPSIS techniques, International Journal of Information Technology & Decision Making 18(4) (2020) 1–73. Google Scholar
    • 177. K. H. Abdulkareem et al., A novel multi-perspective benchmarking framework for selecting image dehazing intelligent algorithms based on BWM and group VIKOR techniques, International Journal of Information Technology & Decision Making 19(3) (2020) 909–957. Link, Web of ScienceGoogle Scholar
    • 178. A. Alamoodi et al., A systematic review into the assessment of medical apps: Motivations, challenges, recommendations and methodological aspect, Health and Technology (2020) 1–17. Web of ScienceGoogle Scholar
    • 179. R. Mohammed et al., Review of the research landscape of multi-criteria evaluation and benchmarking processes for many-objective optimisation methods: Coherent taxonomy, challenges and recommended solution, International Journal of Information Technology & Decision Making (2020). Link, Web of ScienceGoogle Scholar
    • 180. K. A. Dawood et al., Towards a unified criteria model for usability evaluation in the context of open source software based on a fuzzy delphi method, Information and Software Technology (2020) 106453. Web of ScienceGoogle Scholar
    • 181. M. Khatari , Multidimensional benchmarking framework for AQMs of network congestion control based on AHP and group-TOPSIS, International Journal of Information Technology & Decision Making (2020). Web of ScienceGoogle Scholar
    • 182. K. A. Dawood , Novel multi-perspective usability evaluation framework for selection of open source software based on BWM and group VIKOR techniques, International Journal of Information Technology & Decision Making (2020). Google Scholar
    • 183. T.-C. Wang and H.-D. Lee , Developing a fuzzy TOPSIS approach based on subjective weights and objective weights, Expert Systems with Applications 36(5) (2009) 8980–8985. Crossref, Web of ScienceGoogle Scholar
    • 184. K. Nigim, N. Munier and J. Green , Pre-feasibility MCDM tools to aid communities in prioritizing local viable renewable energy sources, Renewable Energy 29(11) (2004) 1775–1791. Crossref, Web of ScienceGoogle Scholar
    • 185. J. Rezaei , Best-worst multi-criteria decision-making method, Omega 53 (2015) 49–57. Crossref, Web of ScienceGoogle Scholar
    • 186. D. Pamučar, Ž. Stević and S. Sremac , A new model for determining weight coefficients of criteria in mcdm models: Full consistency method (fucom), Symmetry 10(9) (2018) 393. Crossref, Web of ScienceGoogle Scholar
    • 187. S. Qahtan et al., Novel multi security and privacy benchmarking framework for blockchain-based IoT healthcare industry 4.0 systems, IEEE Transactions on Industrial Informatics (2022). Crossref, Web of ScienceGoogle Scholar
    • 188. E. Krishnan et al., Interval type 2 trapezoidal-fuzzy weighted with zero inconsistency combined with VIKOR for evaluating smart e-tourism applications, International Journal of Intelligent Systems (2021). Crossref, Web of ScienceGoogle Scholar
    • 189. F. Kutlu Gündoğdu and C. Kahraman , Spherical fuzzy sets and spherical fuzzy TOPSIS method, Journal of Intelligent & Fuzzy Systems 36(1) (2019) 337–352. Crossref, Web of ScienceGoogle Scholar
    • 190. M. Mathew, R. K. Chakrabortty and M. J. Ryan , A novel approach integrating AHP and TOPSIS under spherical fuzzy sets for advanced manufacturing system selection, Engineering Applications of Artificial Intelligence 96 (2020) 103988. Crossref, Web of ScienceGoogle Scholar
    • 191. S. C. Onar, C. Kahraman and B. Oztaysi , Multi-criteria spherical fuzzy regret based evaluation of healthcare equipment stocks, Journal of Intelligent & Fuzzy Systems 2020(Preprint) (2020) 1–11. Google Scholar
    • 192. Y. Rong et al., Generalized spherical fuzzy TODIM approach to multiple criteria decision making, in 2019 IEEE 14th International Conference on Intelligent Systems and Knowledge Engineering (ISKE) (IEEE, 2019). CrossrefGoogle Scholar
    • 193. R. Mohammed et al., Determining importance of many-objective optimisation competitive algorithms evaluation criteria based on a novel fuzzy-weighted zero-inconsistency method, International Journal of Information Technology & Decision Making (2021) 1–47. Web of ScienceGoogle Scholar
    • 194. A. Khan et al., Hospital admission and care of COVID-19 patients problem based on spherical hesitant fuzzy decision support system, International Journal of Intelligent Systems (2021). Crossref, Web of ScienceGoogle Scholar
    • 195. S. Ashraf and S. Abdullah , Emergency decision support modeling for COVID-19 based on spherical fuzzy information, International Journal of Intelligent Systems 35(11) (2020) 1601–1645. Crossref, Web of ScienceGoogle Scholar
    • 196. J. Brooke and D. Jackson , Older people and COVID-19: Isolation, risk and ageism, Journal of Clinical Nursing 29(13–14) (2020) 2044–2046. Crossref, Web of ScienceGoogle Scholar
    • 197. J. Ran et al., Blood pressure control and adverse outcomes of COVID-19 infection in patients with concomitant hypertension in Wuhan, China, Hypertension Research 43(11) (2020) 1267–1276. Crossref, Web of ScienceGoogle Scholar
    • 198. K. J. Clerkin et al., COVID-19 and cardiovascular disease, 141(20) (2020) 1648–1655. Google Scholar
    • 199. J. Abbasi , Researchers investigate what COVID-19 does to the heart, JAMA 325(9) (2021) 808–811. Crossref, Web of ScienceGoogle Scholar
    • 200. J. M. Leung et al., COVID-19 and COPD, European Respiratory Journal 56(2) (2020) 2002108. Crossref, Web of ScienceGoogle Scholar
    • 201. L. Kompaniyets et al., Body mass index and risk for COVID-19–related hospitalization, intensive care unit admission, invasive mechanical ventilation, and death—united states, march–december 2020, 70(10) (2021) 355. Google Scholar
    • 202. D. Gibertoni et al., COVID-19 incidence and mortality in non-dialysis chronic kidney disease patients, PLoS One 16(7) (2021) e0254525. Crossref, Web of ScienceGoogle Scholar
    • 203. J. Hartmann-Boyce et al., Diabetes and COVID-19: Risks, management, and learnings from other national disasters, Diabetes Care 43(8) (2020) 1695. Crossref, Web of ScienceGoogle Scholar
    • 204. I. Suárez-García et al., In-hospital mortality among immunosuppressed patients with COVID-19: Analysis from a national cohort in Spain, PLoS ONE 16(8) (2021) e0255524. Crossref, Web of ScienceGoogle Scholar
    • 205. K. J. Gray et al., Coronavirus disease 2019 vaccine response in pregnant and lactating women: A cohort study (2021). Google Scholar
    • 206. A. Singh, A. M. Brandow and J. A. Panepinto , COVID-19 in individuals with sickle cell disease/trait compared with other Black individuals, Blood Advances 5(7) (2021) 1915–1921. Crossref, Web of ScienceGoogle Scholar
    • 207. R. Rizzo et al., Impact of the COVID-19 pandemic on family wellbeing in the context of neurodevelopmental disorders, 17 (2021) 3007. Google Scholar
    • 208. N. R. FDA, Coronavirus (COVID-19) update: FDA authorizes monoclonal antibody for treatment of COVID-19, (2021). Google Scholar
    • 209. B. Di et al., Identification and validation of predictive factors for progression to severe COVID-19 pneumonia by proteomics, Signal Transduction and Targeted Therapy 5(1) (2020) 217. Crossref, Web of ScienceGoogle Scholar
    • 210. D. Pamucar et al., A novel fuzzy hybrid neutrosophic decision-making approach for the resilient supplier selection problem, International Journal of Intelligent Systems 35(12) (2020) 1934–1986. Crossref, Web of ScienceGoogle Scholar
    • 211. M. Khatari et al., Multidimensional benchmarking framework for AQMs of network congestion control based on AHP and Group-TOPSIS, International Journal of Information Technology & Decision Making (2021) 1–38. Web of ScienceGoogle Scholar
    • 212. R. A. Hamid et al., Dempster–Shafer theory for classification and hybridised models of multi-criteria decision analysis for prioritisation: a telemedicine framework for patients with heart diseases, Journal of Ambient Intelligence and Humanized Computing (2021) 1–35. Web of ScienceGoogle Scholar
    • 213. M. M. Salih et al., Benchmarking of AQM methods of network congestion control based on extension of interval type-2 trapezoidal fuzzy decision by opinion score method, Telecommunication Systems (2021) 1–30. Web of ScienceGoogle Scholar
    • 214. A. S. Albahri et al., Development of IoT-based mhealth framework for various cases of heart disease patients, Health and Technology (2021). Crossref, Web of ScienceGoogle Scholar
    • 215. M. S. Al-Samarraay et al., A new extension of FDOSM based on Pythagorean fuzzy environment for evaluating and benchmarking sign language recognition systems. Neural Computing and Applications (2022) 1–19. Web of ScienceGoogle Scholar
    • 216. O. S. Albahri , New mHealth hospital selection framework supporting decentralised telemedicine architecture for outpatient cardiovascular disease-based integrated techniques: Haversine-GPS and AHP-VIKOR, Ambient Intelligence and Humanized Computing (2021). Google Scholar
    • 217. A. Alamoodi et al., New extension of fuzzy-weighted zero-inconsistency and fuzzy decision by opinion score method based on cubic pythagorean fuzzy environment: A benchmarking case study of sign language recognition systems, International Journal of Fuzzy Systems (2022) 1–18. Web of ScienceGoogle Scholar
    • 218. A. Alamoodi et al., Based on neutrosophic fuzzy environment: A new development of FWZIC and FDOSM for benchmarking smart e-tourism applications, Complex & Intelligent Systems (2022) 1–25. Web of ScienceGoogle Scholar
    • 219. A. Alamleh et al., Federated learning for IoMT applications: A standardisation and benchmarking framework of intrusion detection systems, IEEE Journal of Biomedical and Health Informatics (2022). Web of ScienceGoogle Scholar
    • 220. S. Al-Humairi et al., Towards sustainable transportation: A pavement strategy selection based on the extension of dual-hesitant fuzzy multi-criteria decision-making methods, IEEE Transactions on Fuzzy Systems (2022). Web of ScienceGoogle Scholar
    • 221. O. Albahri et al., Combination of fuzzy-weighted zero-inconsistency and fuzzy decision by opinion score methods in pythagorean m-polar fuzzy environment: A case study of sing language recognition systems, International Journal of Information Technology & Decision Making (2022) 1–29. Web of ScienceGoogle Scholar
    • 222. M. S. Al-Samarraay et al., Extension of interval-valued Pythagorean FDOSM for evaluating and benchmarking real-time SLRSs based on multidimensional criteria of hand gesture recognition and sensor glove perspectives, Applied Soft Computing 116 (2022) 108284. Crossref, Web of ScienceGoogle Scholar