首页 > 最新文献

Int. J. Interdiscip. Telecommun. Netw.最新文献

英文 中文
Evaluating Reminders for Medication Adherence and Side Effects in M-Health Environment 评估移动医疗环境中药物依从性和副作用提醒
Pub Date : 2020-07-01 DOI: 10.4018/ijitn.2020070105
N. Singh, U. Varshney
Reminders are a very promising intervention for improving medication adherence in mobile health environment. From the published literature, this research find that effectiveness of reminders varies widely and side effects of reminders have not been studied. To address these, this article develops an analytical model to evaluate different types of reminders for medication adherence. The model is also used to estimate side effects of the reminders. The results indicate that context-aware reminders perform better than simple reminders in improving medication adherence for willing patients in mobile health environment. Simple and persistent reminders also lead to more side effects than context-aware reminders. The results of this study will be useful for patients, healthcare providers, researchers and policy makers in improved decision making for medication adherence. The future work can include development of smart reminders to meet different requirements of patients, healthcare professionals and payers in terms of personalization, performance, long-term effectiveness, reliability, and health outcomes.
提醒是一个非常有前途的干预措施,以提高药物依从性在移动卫生环境。从已发表的文献来看,本研究发现提醒的有效性差异很大,并且没有对提醒的副作用进行研究。为了解决这些问题,本文开发了一个分析模型来评估不同类型的药物依从性提醒。该模型还用于估计提醒的副作用。结果表明,在移动医疗环境中,情境感知提醒比简单提醒更能提高患者的服药依从性。简单和持久的提醒也会比上下文相关的提醒带来更多的副作用。本研究的结果将有助于患者、医疗保健提供者、研究人员和政策制定者改善药物依从性的决策。未来的工作可以包括开发智能提醒,以满足患者、医疗保健专业人员和付款人在个性化、性能、长期有效性、可靠性和健康结果方面的不同需求。
{"title":"Evaluating Reminders for Medication Adherence and Side Effects in M-Health Environment","authors":"N. Singh, U. Varshney","doi":"10.4018/ijitn.2020070105","DOIUrl":"https://doi.org/10.4018/ijitn.2020070105","url":null,"abstract":"Reminders are a very promising intervention for improving medication adherence in mobile health environment. From the published literature, this research find that effectiveness of reminders varies widely and side effects of reminders have not been studied. To address these, this article develops an analytical model to evaluate different types of reminders for medication adherence. The model is also used to estimate side effects of the reminders. The results indicate that context-aware reminders perform better than simple reminders in improving medication adherence for willing patients in mobile health environment. Simple and persistent reminders also lead to more side effects than context-aware reminders. The results of this study will be useful for patients, healthcare providers, researchers and policy makers in improved decision making for medication adherence. The future work can include development of smart reminders to meet different requirements of patients, healthcare professionals and payers in terms of personalization, performance, long-term effectiveness, reliability, and health outcomes.","PeriodicalId":120331,"journal":{"name":"Int. J. Interdiscip. Telecommun. Netw.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129647074","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
From Fan-Centric Handset Manufacturing to Intense Product Diversification: A Study of the Rapid Transformation of a Telecommunication Giant in China and Beyond 从以粉丝为中心的手机制造到密集的产品多元化:一家国内外电信巨头的快速转型研究
Pub Date : 2020-04-01 DOI: 10.4018/ijitn.2020040102
Min Zhang, K. Passerini
Xiaomi Corporation is a very successful company in the wireless telecommunications industry in China. The company has been able to adopt a “fan-centric” business model that includes extensive input from their customer base on handset design, user interface design, and features for other products/services offered by the company. The “innovation ecosystem” the company created has allowed a recent surge in sales and popularity that provides a model for other wireless telecommunications companies ranging from network service providers to application developers to follow.
小米公司是中国无线通信行业非常成功的公司。该公司已经能够采用“以粉丝为中心”的商业模式,包括从他们的客户群中广泛输入手机设计,用户界面设计,以及公司提供的其他产品/服务的功能。该公司创建的“创新生态系统”使其最近的销售和受欢迎程度激增,为从网络服务提供商到应用程序开发商等其他无线电信公司提供了一个效仿的模式。
{"title":"From Fan-Centric Handset Manufacturing to Intense Product Diversification: A Study of the Rapid Transformation of a Telecommunication Giant in China and Beyond","authors":"Min Zhang, K. Passerini","doi":"10.4018/ijitn.2020040102","DOIUrl":"https://doi.org/10.4018/ijitn.2020040102","url":null,"abstract":"Xiaomi Corporation is a very successful company in the wireless telecommunications industry in China. The company has been able to adopt a “fan-centric” business model that includes extensive input from their customer base on handset design, user interface design, and features for other products/services offered by the company. The “innovation ecosystem” the company created has allowed a recent surge in sales and popularity that provides a model for other wireless telecommunications companies ranging from network service providers to application developers to follow.","PeriodicalId":120331,"journal":{"name":"Int. J. Interdiscip. Telecommun. Netw.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128526621","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
RFID Implementation in Supply Chain Management RFID在供应链管理中的应用
Pub Date : 2020-04-01 DOI: 10.4018/ijitn.2020040103
P. Podduturi, Trevor Maco, Pouyan Ahmadi, Khondkar R. Islam
A network that is based on a traditional telecommunications network and the Internet is known as the internet of things (IoT). The devices in such networks connect peers and form advanced collaborations. radio frequency identification (RFID) has become a hot topic in recent years with the development of the IOT. However, the traditional RFID reader systems have some drawbacks, such as: single node failure, limited effective reading distance of the reader, and slow reading speeds. The proposed system describes how to estimate the location of an object using RFID technology. This article also incorporates a peer-to-peer (P2P) system to locate individual objects in a supply chain management network, which enables scalable indexing of objects in large distributed traceable networks.
基于传统电信网和互联网的网络被称为物联网(Internet of things, IoT)。这种网络中的设备连接对等体并形成高级协作。近年来,随着物联网的发展,射频识别(RFID)已成为一个热门话题。然而,传统的RFID读写器系统存在着单节点失效、读写器有效读取距离有限、读取速度慢等缺点。该系统描述了如何使用RFID技术来估计物体的位置。本文还集成了一个点对点(P2P)系统,用于定位供应链管理网络中的单个对象,从而支持对大型分布式可跟踪网络中的对象进行可扩展索引。
{"title":"RFID Implementation in Supply Chain Management","authors":"P. Podduturi, Trevor Maco, Pouyan Ahmadi, Khondkar R. Islam","doi":"10.4018/ijitn.2020040103","DOIUrl":"https://doi.org/10.4018/ijitn.2020040103","url":null,"abstract":"A network that is based on a traditional telecommunications network and the Internet is known as the internet of things (IoT). The devices in such networks connect peers and form advanced collaborations. radio frequency identification (RFID) has become a hot topic in recent years with the development of the IOT. However, the traditional RFID reader systems have some drawbacks, such as: single node failure, limited effective reading distance of the reader, and slow reading speeds. The proposed system describes how to estimate the location of an object using RFID technology. This article also incorporates a peer-to-peer (P2P) system to locate individual objects in a supply chain management network, which enables scalable indexing of objects in large distributed traceable networks.","PeriodicalId":120331,"journal":{"name":"Int. J. Interdiscip. Telecommun. Netw.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128949399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Novel Idea of Implementing Birth-Death Process to Model SU Transmission in CRN Over MPC 一种利用生灭过程模拟MPC上CRN中SU传输的新思路
Pub Date : 2020-04-01 DOI: 10.4018/ijitn.2020040105
Chowdhury Sajadul Islam
This article proposes a solution to address spectrum scarcity matter by providing birth-death process dealing with a secondary user (SU) transmission over multiple primary channels (MPC) in a cognitive radio network (CRN). By taking advantage of the under-use of spectrum resources of licensed users, CR systems can develop the use of radio spectrum efficiently. The SU must remain in the interweaving performance process and find spectrum gaps before transmission. Furthermore, both expected slots and transmission slots comprise the extended delivery time (EDT) for the secondary user. In order to model the cognitive transmission of the SU on MPC, especially the author has made a birth-death model. This strategy is referred to as an accurate probability density function (PDF) and probability mass function (PMF) of EDT of the secondary transmission for both continuous and periodic sensing cases. In this research, the author also represents numerical and simulation results to demonstrate analysis and mathematical expression.
本文提出了一种解决频谱短缺问题的方法,通过在认知无线电网络(CRN)中提供多主信道(MPC)上的辅助用户(SU)传输的生灭过程。通过利用持牌用户未充分利用的频谱资源,CR系统可以有效地开发无线电频谱的利用。SU必须保持在交织性能过程中,并在传输前找到频谱间隙。此外,预期时隙和传输时隙都构成了辅助用户的延长传输时间(EDT)。为了模拟大学生在MPC上的认知传递,笔者特别建立了一个出生-死亡模型。该策略被称为二次传播EDT的精确概率密度函数(PDF)和概率质量函数(PMF),适用于连续和周期传感情况。在本研究中,作者还用数值和仿真结果来证明分析和数学表达。
{"title":"A Novel Idea of Implementing Birth-Death Process to Model SU Transmission in CRN Over MPC","authors":"Chowdhury Sajadul Islam","doi":"10.4018/ijitn.2020040105","DOIUrl":"https://doi.org/10.4018/ijitn.2020040105","url":null,"abstract":"This article proposes a solution to address spectrum scarcity matter by providing birth-death process dealing with a secondary user (SU) transmission over multiple primary channels (MPC) in a cognitive radio network (CRN). By taking advantage of the under-use of spectrum resources of licensed users, CR systems can develop the use of radio spectrum efficiently. The SU must remain in the interweaving performance process and find spectrum gaps before transmission. Furthermore, both expected slots and transmission slots comprise the extended delivery time (EDT) for the secondary user. In order to model the cognitive transmission of the SU on MPC, especially the author has made a birth-death model. This strategy is referred to as an accurate probability density function (PDF) and probability mass function (PMF) of EDT of the secondary transmission for both continuous and periodic sensing cases. In this research, the author also represents numerical and simulation results to demonstrate analysis and mathematical expression.","PeriodicalId":120331,"journal":{"name":"Int. J. Interdiscip. Telecommun. Netw.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132524615","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Constructing New NLFSR Functions with Optimal Periods 构造新的具有最优周期的NLFSR函数
Pub Date : 2020-04-01 DOI: 10.4018/ijitn.2020040106
I. Al-Hejri, Sultan Almuhammadi
Pseudorandom bit generators are essential components in many security applications. The security of the system relies on the security of its components. Feedback shift registers are commonly used to generate pseudorandom bits. Nonlinear feedback shift registers (NLFSRs) are known to be more secure than the linear ones. However, there is no mathematical foundation on how to construct NLFSR feedback functions with optimal periods. This article considers a new type of NLFSR capable of constructing feedback functions of degree 3 with optimal periods. Using their construction method, the authors propose new functions of this type.
伪随机位发生器是许多安全应用中必不可少的组成部分。系统的安全性依赖于其组件的安全性。反馈移位寄存器通常用于生成伪随机位。非线性反馈移位寄存器(NLFSRs)被认为比线性移位寄存器更安全。然而,如何构造具有最优周期的NLFSR反馈函数尚无数学基础。本文考虑了一种能够构造具有最优周期的3次反馈函数的新型NLFSR。利用他们的构造方法,作者提出了这类函数的新功能。
{"title":"Constructing New NLFSR Functions with Optimal Periods","authors":"I. Al-Hejri, Sultan Almuhammadi","doi":"10.4018/ijitn.2020040106","DOIUrl":"https://doi.org/10.4018/ijitn.2020040106","url":null,"abstract":"Pseudorandom bit generators are essential components in many security applications. The security of the system relies on the security of its components. Feedback shift registers are commonly used to generate pseudorandom bits. Nonlinear feedback shift registers (NLFSRs) are known to be more secure than the linear ones. However, there is no mathematical foundation on how to construct NLFSR feedback functions with optimal periods. This article considers a new type of NLFSR capable of constructing feedback functions of degree 3 with optimal periods. Using their construction method, the authors propose new functions of this type.","PeriodicalId":120331,"journal":{"name":"Int. J. Interdiscip. Telecommun. Netw.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121176049","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Adaptive Complex Filtering for Narrowband Jamming Mitigation in Resource-Constrained Wireless Networks 资源受限无线网络窄带干扰抑制的自适应复杂滤波
Pub Date : 2020-04-01 DOI: 10.4018/IJITN.2020040104
Z. Valkova-Jarvis, D. Mihaylova, A. Mihovska, G. Iliev
Jamming attacks present a major challenge for the physical layer security of wireless communication systems. Among the large number of existing methods for jamming mitigation, filtering is a simple but promisingly effective solution that can be applied in resource-constrained and low-power wireless networks. In this article, a first-order adaptive complex narrowband notch filter is proposed for use against high-power narrowband jamming attacks. The central frequency of the filter is adaptively adjustable to match the interfering frequency. This enables the proposed solution to perform effectively in the presence of a jammer whose frequency varies in fixed or random time periods. The simulation results demonstrate the filter's behavior and the efficiency of the proposed technique.
干扰攻击是无线通信系统物理层安全面临的主要挑战。在众多现有的干扰缓解方法中,滤波是一种简单而有效的解决方案,可应用于资源受限和低功耗的无线网络。本文提出了一种一阶自适应复杂窄带陷波滤波器,用于对抗大功率窄带干扰攻击。滤波器的中心频率可自适应调节,以匹配干扰频率。这使得所提出的解决方案能够在频率在固定或随机时间段变化的干扰器存在的情况下有效地执行。仿真结果验证了该滤波器的性能和所提技术的有效性。
{"title":"Adaptive Complex Filtering for Narrowband Jamming Mitigation in Resource-Constrained Wireless Networks","authors":"Z. Valkova-Jarvis, D. Mihaylova, A. Mihovska, G. Iliev","doi":"10.4018/IJITN.2020040104","DOIUrl":"https://doi.org/10.4018/IJITN.2020040104","url":null,"abstract":"Jamming attacks present a major challenge for the physical layer security of wireless communication systems. Among the large number of existing methods for jamming mitigation, filtering is a simple but promisingly effective solution that can be applied in resource-constrained and low-power wireless networks. In this article, a first-order adaptive complex narrowband notch filter is proposed for use against high-power narrowband jamming attacks. The central frequency of the filter is adaptively adjustable to match the interfering frequency. This enables the proposed solution to perform effectively in the presence of a jammer whose frequency varies in fixed or random time periods. The simulation results demonstrate the filter's behavior and the efficiency of the proposed technique.","PeriodicalId":120331,"journal":{"name":"Int. J. Interdiscip. Telecommun. Netw.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114236420","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Lower-Limb Rehabilitation at Home: A Survey on Exercise Assessment and Initial Study on Exercise State Identification Toward Biofeedback 家庭下肢康复:运动评估调查及运动状态识别生物反馈的初步研究
Pub Date : 2020-01-01 DOI: 10.4018/ijitn.2020010102
Seanglidet Yean, Bu-Sung Lee, C. Yeo
Ageing causes loss of muscle strength, especially on the lower limbs, resulting in higher risk to injuries during functional activities. The path to recovery is through physiotherapy and adopt customized rehabilitation exercise to assist the patients. Hence, lowering the risk of incorrect exercise at home involves the use of biofeedback for physical rehabilitation patients and quantitative reports for clinical physiotherapy. This research topic has garnered much attention in recent years owing to the fast ageing population and the limited number of clinical experts. In this paper, the authors survey the existing works in exercise assessment and state identification. The evaluation results in the accuracy of 95.83% average classifying exercise motion state using the proposed raw signal. It confirmed that raw signals have more impact than using sensor-fused Euler and joint angles in the state identification prediction model.
衰老会导致肌肉力量的丧失,尤其是下肢,从而导致在功能性活动中受伤的风险更高。康复的途径是通过物理治疗和采用定制的康复运动来帮助患者。因此,降低在家不正确运动的风险涉及到对物理康复患者使用生物反馈和临床物理治疗的定量报告。近年来,由于人口快速老龄化和临床专家数量有限,这一研究课题受到了广泛关注。本文对运动评估和状态识别方面的研究现状进行了综述。评价结果表明,使用所提出的原始信号对运动状态进行分类的准确率平均为95.83%。验证了原始信号在状态识别预测模型中比使用传感器融合欧拉和关节角的影响更大。
{"title":"Lower-Limb Rehabilitation at Home: A Survey on Exercise Assessment and Initial Study on Exercise State Identification Toward Biofeedback","authors":"Seanglidet Yean, Bu-Sung Lee, C. Yeo","doi":"10.4018/ijitn.2020010102","DOIUrl":"https://doi.org/10.4018/ijitn.2020010102","url":null,"abstract":"Ageing causes loss of muscle strength, especially on the lower limbs, resulting in higher risk to injuries during functional activities. The path to recovery is through physiotherapy and adopt customized rehabilitation exercise to assist the patients. Hence, lowering the risk of incorrect exercise at home involves the use of biofeedback for physical rehabilitation patients and quantitative reports for clinical physiotherapy. This research topic has garnered much attention in recent years owing to the fast ageing population and the limited number of clinical experts. In this paper, the authors survey the existing works in exercise assessment and state identification. The evaluation results in the accuracy of 95.83% average classifying exercise motion state using the proposed raw signal. It confirmed that raw signals have more impact than using sensor-fused Euler and joint angles in the state identification prediction model.","PeriodicalId":120331,"journal":{"name":"Int. J. Interdiscip. Telecommun. Netw.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126247473","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Weighted Multiple Linear Regression Model for Mobile Location Estimation in GSM Network GSM网络中移动位置估计的加权多元线性回归模型
Pub Date : 2020-01-01 DOI: 10.4018/ijitn.2020010105
L. Ezema, C. Ani
The numbers of crimes and accidents, among other challenging issues, requiring a mobile application with localization capabilities are on the increase. Yet there is under-utilization of location information provided by mobile phones. The accuracy and cost of implementation of mobile position localization on cellular network have been an issue of research interest. In this paper, the statistical modelling of mobile station (MS) position location was carried out using weighted multiple linear regressions (WMLR) method. The proposed statistical modelling approach was based on received signal strength (RSS) technique. The model improved localization accuracy. The model's simulated results were analysed and compared with the existing MLR using real measured data collected from GSM network in a light urban environment in Enugu, Nigeria.
犯罪和事故的数量,以及其他具有挑战性的问题,要求具有本地化功能的移动应用程序正在增加。然而,移动电话提供的位置信息还没有得到充分利用。在蜂窝网络上实现移动位置定位的精度和成本一直是研究的热点问题。本文采用加权多元线性回归(WMLR)方法对移动站(MS)位置定位进行统计建模。所提出的统计建模方法是基于接收信号强度(RSS)技术。该模型提高了定位精度。利用尼日利亚埃努古一个轻城市环境中GSM网络的实测数据,对模型的模拟结果进行了分析,并与现有的MLR进行了比较。
{"title":"Weighted Multiple Linear Regression Model for Mobile Location Estimation in GSM Network","authors":"L. Ezema, C. Ani","doi":"10.4018/ijitn.2020010105","DOIUrl":"https://doi.org/10.4018/ijitn.2020010105","url":null,"abstract":"The numbers of crimes and accidents, among other challenging issues, requiring a mobile application with localization capabilities are on the increase. Yet there is under-utilization of location information provided by mobile phones. The accuracy and cost of implementation of mobile position localization on cellular network have been an issue of research interest. In this paper, the statistical modelling of mobile station (MS) position location was carried out using weighted multiple linear regressions (WMLR) method. The proposed statistical modelling approach was based on received signal strength (RSS) technique. The model improved localization accuracy. The model's simulated results were analysed and compared with the existing MLR using real measured data collected from GSM network in a light urban environment in Enugu, Nigeria.","PeriodicalId":120331,"journal":{"name":"Int. J. Interdiscip. Telecommun. Netw.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114346424","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Attack-Tree Based Risk Assessment on Cloud-Oriented Wireless Body Area Network 基于攻击树的面向云的无线体域网络风险评估
Pub Date : 2019-10-01 DOI: 10.4018/IJITN.2019100105
Theodoros Mavroeidakos, N. Tsolis, D. Vergados, S. Kotsopoulos
Machine-to-machine (M2M) communication is an emerging technology with unrivaled benefits in the fields of e Health and m-Health. The wireless body area networks (WBANs) consist of a major subdomain of M2M communications. The WBANs coupled with the Cloud Computing (CC) paradigm introduce a supreme infrastructure in terms of performance and Quality of Services (QoS) for the development of eHealth applications. In this article, a risk assessment aiming to disclose potential threats and highlight exploitation of health care services, is introduced. The proposed assessment is based upon the implementation of a series of steps. Initially, the health care WBAN-CC infrastructure is scrutinized; then, its threats' taxonomy is identified. Then, a risk assessment is carried out based on an attack-tree consisting of the most hazardous threats against Personally Identifiable Information (PII) disclosure. Thus, the implementation of several countermeasures is realized as a means to mitigate gaps.
机器对机器(M2M)通信是一项新兴技术,在电子健康和移动健康领域具有无与伦比的优势。无线体域网络(wban)由M2M通信的一个主要子域组成。wban与云计算(CC)范例相结合,为电子健康应用程序的开发引入了性能和服务质量(QoS)方面的最高基础设施。在本文中,介绍了一种风险评估,旨在揭示潜在威胁并突出利用医疗保健服务。拟议的评估是基于一系列步骤的执行情况。最初,对卫生保健WBAN-CC基础设施进行审查;然后,确定其威胁的分类。然后,根据针对个人身份信息(PII)泄露的最危险威胁组成的攻击树进行风险评估。因此,实施若干对策是一种缓解差距的手段。
{"title":"Attack-Tree Based Risk Assessment on Cloud-Oriented Wireless Body Area Network","authors":"Theodoros Mavroeidakos, N. Tsolis, D. Vergados, S. Kotsopoulos","doi":"10.4018/IJITN.2019100105","DOIUrl":"https://doi.org/10.4018/IJITN.2019100105","url":null,"abstract":"Machine-to-machine (M2M) communication is an emerging technology with unrivaled benefits in the fields of e Health and m-Health. The wireless body area networks (WBANs) consist of a major subdomain of M2M communications. The WBANs coupled with the Cloud Computing (CC) paradigm introduce a supreme infrastructure in terms of performance and Quality of Services (QoS) for the development of eHealth applications. In this article, a risk assessment aiming to disclose potential threats and highlight exploitation of health care services, is introduced. The proposed assessment is based upon the implementation of a series of steps. Initially, the health care WBAN-CC infrastructure is scrutinized; then, its threats' taxonomy is identified. Then, a risk assessment is carried out based on an attack-tree consisting of the most hazardous threats against Personally Identifiable Information (PII) disclosure. Thus, the implementation of several countermeasures is realized as a means to mitigate gaps.","PeriodicalId":120331,"journal":{"name":"Int. J. Interdiscip. Telecommun. Netw.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129468407","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fiber-Optic Based Solutions for Long-Tunnels Radio Coverage and Surveillance 基于光纤的长隧道无线电覆盖和监视解决方案
Pub Date : 2019-10-01 DOI: 10.4018/IJITN.2019100103
M. Nahas
This article proposes fiber-optic based solutions for radio coverage and surveillance inside long road tunnels. The study is suitable for application in areas where many long mountain tunnels exist such as the well-known city of Mecca and its surrounding pilgrimage places. These particular tunnels accommodate plenty of vehicles and pedestrians during the pilgrimage period while the wireless coverage inside the tunnels is at risk and is totally lost far from the tunnel entrances. This in turn hinders emergency communications during the rush times. This research discusses ways to enhance the communication and surveillance ability inside such tunnels so that risks and accidents can be prevented, thus large number of pilgrims can be saved.
本文提出了基于光纤的长距离公路隧道内无线电覆盖和监视解决方案。本研究适用于著名的麦加市及其周边朝圣地等长山隧道较多的地区。这些特殊的隧道在朝圣期间容纳了大量的车辆和行人,而隧道内的无线覆盖存在风险,并且在远离隧道入口的地方完全失去信号。这反过来又阻碍了高峰时期的紧急通信。本研究探讨如何加强隧道内的通讯和监控能力,以防止风险和事故,从而拯救大量的朝圣者。
{"title":"Fiber-Optic Based Solutions for Long-Tunnels Radio Coverage and Surveillance","authors":"M. Nahas","doi":"10.4018/IJITN.2019100103","DOIUrl":"https://doi.org/10.4018/IJITN.2019100103","url":null,"abstract":"This article proposes fiber-optic based solutions for radio coverage and surveillance inside long road tunnels. The study is suitable for application in areas where many long mountain tunnels exist such as the well-known city of Mecca and its surrounding pilgrimage places. These particular tunnels accommodate plenty of vehicles and pedestrians during the pilgrimage period while the wireless coverage inside the tunnels is at risk and is totally lost far from the tunnel entrances. This in turn hinders emergency communications during the rush times. This research discusses ways to enhance the communication and surveillance ability inside such tunnels so that risks and accidents can be prevented, thus large number of pilgrims can be saved.","PeriodicalId":120331,"journal":{"name":"Int. J. Interdiscip. Telecommun. Netw.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125612461","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
Int. J. Interdiscip. Telecommun. Netw.
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1