Int. J. Interdiscip. Telecommun. Netw.最新文献

筛选
英文 中文
Evaluating Reminders for Medication Adherence and Side Effects in M-Health Environment 评估移动医疗环境中药物依从性和副作用提醒
Int. J. Interdiscip. Telecommun. Netw. Pub Date : 2020-07-01 DOI: 10.4018/ijitn.2020070105
N. Singh, U. Varshney
{"title":"Evaluating Reminders for Medication Adherence and Side Effects in M-Health Environment","authors":"N. Singh, U. Varshney","doi":"10.4018/ijitn.2020070105","DOIUrl":"https://doi.org/10.4018/ijitn.2020070105","url":null,"abstract":"Reminders are a very promising intervention for improving medication adherence in mobile health environment. From the published literature, this research find that effectiveness of reminders varies widely and side effects of reminders have not been studied. To address these, this article develops an analytical model to evaluate different types of reminders for medication adherence. The model is also used to estimate side effects of the reminders. The results indicate that context-aware reminders perform better than simple reminders in improving medication adherence for willing patients in mobile health environment. Simple and persistent reminders also lead to more side effects than context-aware reminders. The results of this study will be useful for patients, healthcare providers, researchers and policy makers in improved decision making for medication adherence. The future work can include development of smart reminders to meet different requirements of patients, healthcare professionals and payers in terms of personalization, performance, long-term effectiveness, reliability, and health outcomes.","PeriodicalId":120331,"journal":{"name":"Int. J. Interdiscip. Telecommun. Netw.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129647074","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
From Fan-Centric Handset Manufacturing to Intense Product Diversification: A Study of the Rapid Transformation of a Telecommunication Giant in China and Beyond 从以粉丝为中心的手机制造到密集的产品多元化:一家国内外电信巨头的快速转型研究
Int. J. Interdiscip. Telecommun. Netw. Pub Date : 2020-04-01 DOI: 10.4018/ijitn.2020040102
Min Zhang, K. Passerini
{"title":"From Fan-Centric Handset Manufacturing to Intense Product Diversification: A Study of the Rapid Transformation of a Telecommunication Giant in China and Beyond","authors":"Min Zhang, K. Passerini","doi":"10.4018/ijitn.2020040102","DOIUrl":"https://doi.org/10.4018/ijitn.2020040102","url":null,"abstract":"Xiaomi Corporation is a very successful company in the wireless telecommunications industry in China. The company has been able to adopt a “fan-centric” business model that includes extensive input from their customer base on handset design, user interface design, and features for other products/services offered by the company. The “innovation ecosystem” the company created has allowed a recent surge in sales and popularity that provides a model for other wireless telecommunications companies ranging from network service providers to application developers to follow.","PeriodicalId":120331,"journal":{"name":"Int. J. Interdiscip. Telecommun. Netw.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128526621","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
RFID Implementation in Supply Chain Management RFID在供应链管理中的应用
Int. J. Interdiscip. Telecommun. Netw. Pub Date : 2020-04-01 DOI: 10.4018/ijitn.2020040103
P. Podduturi, Trevor Maco, Pouyan Ahmadi, Khondkar R. Islam
{"title":"RFID Implementation in Supply Chain Management","authors":"P. Podduturi, Trevor Maco, Pouyan Ahmadi, Khondkar R. Islam","doi":"10.4018/ijitn.2020040103","DOIUrl":"https://doi.org/10.4018/ijitn.2020040103","url":null,"abstract":"A network that is based on a traditional telecommunications network and the Internet is known as the internet of things (IoT). The devices in such networks connect peers and form advanced collaborations. radio frequency identification (RFID) has become a hot topic in recent years with the development of the IOT. However, the traditional RFID reader systems have some drawbacks, such as: single node failure, limited effective reading distance of the reader, and slow reading speeds. The proposed system describes how to estimate the location of an object using RFID technology. This article also incorporates a peer-to-peer (P2P) system to locate individual objects in a supply chain management network, which enables scalable indexing of objects in large distributed traceable networks.","PeriodicalId":120331,"journal":{"name":"Int. J. Interdiscip. Telecommun. Netw.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128949399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Novel Idea of Implementing Birth-Death Process to Model SU Transmission in CRN Over MPC 一种利用生灭过程模拟MPC上CRN中SU传输的新思路
Int. J. Interdiscip. Telecommun. Netw. Pub Date : 2020-04-01 DOI: 10.4018/ijitn.2020040105
Chowdhury Sajadul Islam
{"title":"A Novel Idea of Implementing Birth-Death Process to Model SU Transmission in CRN Over MPC","authors":"Chowdhury Sajadul Islam","doi":"10.4018/ijitn.2020040105","DOIUrl":"https://doi.org/10.4018/ijitn.2020040105","url":null,"abstract":"This article proposes a solution to address spectrum scarcity matter by providing birth-death process dealing with a secondary user (SU) transmission over multiple primary channels (MPC) in a cognitive radio network (CRN). By taking advantage of the under-use of spectrum resources of licensed users, CR systems can develop the use of radio spectrum efficiently. The SU must remain in the interweaving performance process and find spectrum gaps before transmission. Furthermore, both expected slots and transmission slots comprise the extended delivery time (EDT) for the secondary user. In order to model the cognitive transmission of the SU on MPC, especially the author has made a birth-death model. This strategy is referred to as an accurate probability density function (PDF) and probability mass function (PMF) of EDT of the secondary transmission for both continuous and periodic sensing cases. In this research, the author also represents numerical and simulation results to demonstrate analysis and mathematical expression.","PeriodicalId":120331,"journal":{"name":"Int. J. Interdiscip. Telecommun. Netw.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132524615","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Constructing New NLFSR Functions with Optimal Periods 构造新的具有最优周期的NLFSR函数
Int. J. Interdiscip. Telecommun. Netw. Pub Date : 2020-04-01 DOI: 10.4018/ijitn.2020040106
I. Al-Hejri, Sultan Almuhammadi
{"title":"Constructing New NLFSR Functions with Optimal Periods","authors":"I. Al-Hejri, Sultan Almuhammadi","doi":"10.4018/ijitn.2020040106","DOIUrl":"https://doi.org/10.4018/ijitn.2020040106","url":null,"abstract":"Pseudorandom bit generators are essential components in many security applications. The security of the system relies on the security of its components. Feedback shift registers are commonly used to generate pseudorandom bits. Nonlinear feedback shift registers (NLFSRs) are known to be more secure than the linear ones. However, there is no mathematical foundation on how to construct NLFSR feedback functions with optimal periods. This article considers a new type of NLFSR capable of constructing feedback functions of degree 3 with optimal periods. Using their construction method, the authors propose new functions of this type.","PeriodicalId":120331,"journal":{"name":"Int. J. Interdiscip. Telecommun. Netw.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121176049","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Adaptive Complex Filtering for Narrowband Jamming Mitigation in Resource-Constrained Wireless Networks 资源受限无线网络窄带干扰抑制的自适应复杂滤波
Int. J. Interdiscip. Telecommun. Netw. Pub Date : 2020-04-01 DOI: 10.4018/IJITN.2020040104
Z. Valkova-Jarvis, D. Mihaylova, A. Mihovska, G. Iliev
{"title":"Adaptive Complex Filtering for Narrowband Jamming Mitigation in Resource-Constrained Wireless Networks","authors":"Z. Valkova-Jarvis, D. Mihaylova, A. Mihovska, G. Iliev","doi":"10.4018/IJITN.2020040104","DOIUrl":"https://doi.org/10.4018/IJITN.2020040104","url":null,"abstract":"Jamming attacks present a major challenge for the physical layer security of wireless communication systems. Among the large number of existing methods for jamming mitigation, filtering is a simple but promisingly effective solution that can be applied in resource-constrained and low-power wireless networks. In this article, a first-order adaptive complex narrowband notch filter is proposed for use against high-power narrowband jamming attacks. The central frequency of the filter is adaptively adjustable to match the interfering frequency. This enables the proposed solution to perform effectively in the presence of a jammer whose frequency varies in fixed or random time periods. The simulation results demonstrate the filter's behavior and the efficiency of the proposed technique.","PeriodicalId":120331,"journal":{"name":"Int. J. Interdiscip. Telecommun. Netw.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114236420","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Lower-Limb Rehabilitation at Home: A Survey on Exercise Assessment and Initial Study on Exercise State Identification Toward Biofeedback 家庭下肢康复:运动评估调查及运动状态识别生物反馈的初步研究
Int. J. Interdiscip. Telecommun. Netw. Pub Date : 2020-01-01 DOI: 10.4018/ijitn.2020010102
Seanglidet Yean, Bu-Sung Lee, C. Yeo
{"title":"Lower-Limb Rehabilitation at Home: A Survey on Exercise Assessment and Initial Study on Exercise State Identification Toward Biofeedback","authors":"Seanglidet Yean, Bu-Sung Lee, C. Yeo","doi":"10.4018/ijitn.2020010102","DOIUrl":"https://doi.org/10.4018/ijitn.2020010102","url":null,"abstract":"Ageing causes loss of muscle strength, especially on the lower limbs, resulting in higher risk to injuries during functional activities. The path to recovery is through physiotherapy and adopt customized rehabilitation exercise to assist the patients. Hence, lowering the risk of incorrect exercise at home involves the use of biofeedback for physical rehabilitation patients and quantitative reports for clinical physiotherapy. This research topic has garnered much attention in recent years owing to the fast ageing population and the limited number of clinical experts. In this paper, the authors survey the existing works in exercise assessment and state identification. The evaluation results in the accuracy of 95.83% average classifying exercise motion state using the proposed raw signal. It confirmed that raw signals have more impact than using sensor-fused Euler and joint angles in the state identification prediction model.","PeriodicalId":120331,"journal":{"name":"Int. J. Interdiscip. Telecommun. Netw.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126247473","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Weighted Multiple Linear Regression Model for Mobile Location Estimation in GSM Network GSM网络中移动位置估计的加权多元线性回归模型
Int. J. Interdiscip. Telecommun. Netw. Pub Date : 2020-01-01 DOI: 10.4018/ijitn.2020010105
L. Ezema, C. Ani
{"title":"Weighted Multiple Linear Regression Model for Mobile Location Estimation in GSM Network","authors":"L. Ezema, C. Ani","doi":"10.4018/ijitn.2020010105","DOIUrl":"https://doi.org/10.4018/ijitn.2020010105","url":null,"abstract":"The numbers of crimes and accidents, among other challenging issues, requiring a mobile application with localization capabilities are on the increase. Yet there is under-utilization of location information provided by mobile phones. The accuracy and cost of implementation of mobile position localization on cellular network have been an issue of research interest. In this paper, the statistical modelling of mobile station (MS) position location was carried out using weighted multiple linear regressions (WMLR) method. The proposed statistical modelling approach was based on received signal strength (RSS) technique. The model improved localization accuracy. The model's simulated results were analysed and compared with the existing MLR using real measured data collected from GSM network in a light urban environment in Enugu, Nigeria.","PeriodicalId":120331,"journal":{"name":"Int. J. Interdiscip. Telecommun. Netw.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114346424","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Attack-Tree Based Risk Assessment on Cloud-Oriented Wireless Body Area Network 基于攻击树的面向云的无线体域网络风险评估
Int. J. Interdiscip. Telecommun. Netw. Pub Date : 2019-10-01 DOI: 10.4018/IJITN.2019100105
Theodoros Mavroeidakos, N. Tsolis, D. Vergados, S. Kotsopoulos
{"title":"Attack-Tree Based Risk Assessment on Cloud-Oriented Wireless Body Area Network","authors":"Theodoros Mavroeidakos, N. Tsolis, D. Vergados, S. Kotsopoulos","doi":"10.4018/IJITN.2019100105","DOIUrl":"https://doi.org/10.4018/IJITN.2019100105","url":null,"abstract":"Machine-to-machine (M2M) communication is an emerging technology with unrivaled benefits in the fields of e Health and m-Health. The wireless body area networks (WBANs) consist of a major subdomain of M2M communications. The WBANs coupled with the Cloud Computing (CC) paradigm introduce a supreme infrastructure in terms of performance and Quality of Services (QoS) for the development of eHealth applications. In this article, a risk assessment aiming to disclose potential threats and highlight exploitation of health care services, is introduced. The proposed assessment is based upon the implementation of a series of steps. Initially, the health care WBAN-CC infrastructure is scrutinized; then, its threats' taxonomy is identified. Then, a risk assessment is carried out based on an attack-tree consisting of the most hazardous threats against Personally Identifiable Information (PII) disclosure. Thus, the implementation of several countermeasures is realized as a means to mitigate gaps.","PeriodicalId":120331,"journal":{"name":"Int. J. Interdiscip. Telecommun. Netw.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129468407","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fiber-Optic Based Solutions for Long-Tunnels Radio Coverage and Surveillance 基于光纤的长隧道无线电覆盖和监视解决方案
Int. J. Interdiscip. Telecommun. Netw. Pub Date : 2019-10-01 DOI: 10.4018/IJITN.2019100103
M. Nahas
{"title":"Fiber-Optic Based Solutions for Long-Tunnels Radio Coverage and Surveillance","authors":"M. Nahas","doi":"10.4018/IJITN.2019100103","DOIUrl":"https://doi.org/10.4018/IJITN.2019100103","url":null,"abstract":"This article proposes fiber-optic based solutions for radio coverage and surveillance inside long road tunnels. The study is suitable for application in areas where many long mountain tunnels exist such as the well-known city of Mecca and its surrounding pilgrimage places. These particular tunnels accommodate plenty of vehicles and pedestrians during the pilgrimage period while the wireless coverage inside the tunnels is at risk and is totally lost far from the tunnel entrances. This in turn hinders emergency communications during the rush times. This research discusses ways to enhance the communication and surveillance ability inside such tunnels so that risks and accidents can be prevented, thus large number of pilgrims can be saved.","PeriodicalId":120331,"journal":{"name":"Int. J. Interdiscip. Telecommun. Netw.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125612461","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信