{"title":"Evaluating Reminders for Medication Adherence and Side Effects in M-Health Environment","authors":"N. Singh, U. Varshney","doi":"10.4018/ijitn.2020070105","DOIUrl":"https://doi.org/10.4018/ijitn.2020070105","url":null,"abstract":"Reminders are a very promising intervention for improving medication adherence in mobile health environment. From the published literature, this research find that effectiveness of reminders varies widely and side effects of reminders have not been studied. To address these, this article develops an analytical model to evaluate different types of reminders for medication adherence. The model is also used to estimate side effects of the reminders. The results indicate that context-aware reminders perform better than simple reminders in improving medication adherence for willing patients in mobile health environment. Simple and persistent reminders also lead to more side effects than context-aware reminders. The results of this study will be useful for patients, healthcare providers, researchers and policy makers in improved decision making for medication adherence. The future work can include development of smart reminders to meet different requirements of patients, healthcare professionals and payers in terms of personalization, performance, long-term effectiveness, reliability, and health outcomes.","PeriodicalId":120331,"journal":{"name":"Int. J. Interdiscip. Telecommun. Netw.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129647074","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"From Fan-Centric Handset Manufacturing to Intense Product Diversification: A Study of the Rapid Transformation of a Telecommunication Giant in China and Beyond","authors":"Min Zhang, K. Passerini","doi":"10.4018/ijitn.2020040102","DOIUrl":"https://doi.org/10.4018/ijitn.2020040102","url":null,"abstract":"Xiaomi Corporation is a very successful company in the wireless telecommunications industry in China. The company has been able to adopt a “fan-centric” business model that includes extensive input from their customer base on handset design, user interface design, and features for other products/services offered by the company. The “innovation ecosystem” the company created has allowed a recent surge in sales and popularity that provides a model for other wireless telecommunications companies ranging from network service providers to application developers to follow.","PeriodicalId":120331,"journal":{"name":"Int. J. Interdiscip. Telecommun. Netw.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128526621","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
P. Podduturi, Trevor Maco, Pouyan Ahmadi, Khondkar R. Islam
{"title":"RFID Implementation in Supply Chain Management","authors":"P. Podduturi, Trevor Maco, Pouyan Ahmadi, Khondkar R. Islam","doi":"10.4018/ijitn.2020040103","DOIUrl":"https://doi.org/10.4018/ijitn.2020040103","url":null,"abstract":"A network that is based on a traditional telecommunications network and the Internet is known as the internet of things (IoT). The devices in such networks connect peers and form advanced collaborations. radio frequency identification (RFID) has become a hot topic in recent years with the development of the IOT. However, the traditional RFID reader systems have some drawbacks, such as: single node failure, limited effective reading distance of the reader, and slow reading speeds. The proposed system describes how to estimate the location of an object using RFID technology. This article also incorporates a peer-to-peer (P2P) system to locate individual objects in a supply chain management network, which enables scalable indexing of objects in large distributed traceable networks.","PeriodicalId":120331,"journal":{"name":"Int. J. Interdiscip. Telecommun. Netw.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128949399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Novel Idea of Implementing Birth-Death Process to Model SU Transmission in CRN Over MPC","authors":"Chowdhury Sajadul Islam","doi":"10.4018/ijitn.2020040105","DOIUrl":"https://doi.org/10.4018/ijitn.2020040105","url":null,"abstract":"This article proposes a solution to address spectrum scarcity matter by providing birth-death process dealing with a secondary user (SU) transmission over multiple primary channels (MPC) in a cognitive radio network (CRN). By taking advantage of the under-use of spectrum resources of licensed users, CR systems can develop the use of radio spectrum efficiently. The SU must remain in the interweaving performance process and find spectrum gaps before transmission. Furthermore, both expected slots and transmission slots comprise the extended delivery time (EDT) for the secondary user. In order to model the cognitive transmission of the SU on MPC, especially the author has made a birth-death model. This strategy is referred to as an accurate probability density function (PDF) and probability mass function (PMF) of EDT of the secondary transmission for both continuous and periodic sensing cases. In this research, the author also represents numerical and simulation results to demonstrate analysis and mathematical expression.","PeriodicalId":120331,"journal":{"name":"Int. J. Interdiscip. Telecommun. Netw.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132524615","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Constructing New NLFSR Functions with Optimal Periods","authors":"I. Al-Hejri, Sultan Almuhammadi","doi":"10.4018/ijitn.2020040106","DOIUrl":"https://doi.org/10.4018/ijitn.2020040106","url":null,"abstract":"Pseudorandom bit generators are essential components in many security applications. The security of the system relies on the security of its components. Feedback shift registers are commonly used to generate pseudorandom bits. Nonlinear feedback shift registers (NLFSRs) are known to be more secure than the linear ones. However, there is no mathematical foundation on how to construct NLFSR feedback functions with optimal periods. This article considers a new type of NLFSR capable of constructing feedback functions of degree 3 with optimal periods. Using their construction method, the authors propose new functions of this type.","PeriodicalId":120331,"journal":{"name":"Int. J. Interdiscip. Telecommun. Netw.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121176049","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Z. Valkova-Jarvis, D. Mihaylova, A. Mihovska, G. Iliev
{"title":"Adaptive Complex Filtering for Narrowband Jamming Mitigation in Resource-Constrained Wireless Networks","authors":"Z. Valkova-Jarvis, D. Mihaylova, A. Mihovska, G. Iliev","doi":"10.4018/IJITN.2020040104","DOIUrl":"https://doi.org/10.4018/IJITN.2020040104","url":null,"abstract":"Jamming attacks present a major challenge for the physical layer security of wireless communication systems. Among the large number of existing methods for jamming mitigation, filtering is a simple but promisingly effective solution that can be applied in resource-constrained and low-power wireless networks. In this article, a first-order adaptive complex narrowband notch filter is proposed for use against high-power narrowband jamming attacks. The central frequency of the filter is adaptively adjustable to match the interfering frequency. This enables the proposed solution to perform effectively in the presence of a jammer whose frequency varies in fixed or random time periods. The simulation results demonstrate the filter's behavior and the efficiency of the proposed technique.","PeriodicalId":120331,"journal":{"name":"Int. J. Interdiscip. Telecommun. Netw.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114236420","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Lower-Limb Rehabilitation at Home: A Survey on Exercise Assessment and Initial Study on Exercise State Identification Toward Biofeedback","authors":"Seanglidet Yean, Bu-Sung Lee, C. Yeo","doi":"10.4018/ijitn.2020010102","DOIUrl":"https://doi.org/10.4018/ijitn.2020010102","url":null,"abstract":"Ageing causes loss of muscle strength, especially on the lower limbs, resulting in higher risk to injuries during functional activities. The path to recovery is through physiotherapy and adopt customized rehabilitation exercise to assist the patients. Hence, lowering the risk of incorrect exercise at home involves the use of biofeedback for physical rehabilitation patients and quantitative reports for clinical physiotherapy. This research topic has garnered much attention in recent years owing to the fast ageing population and the limited number of clinical experts. In this paper, the authors survey the existing works in exercise assessment and state identification. The evaluation results in the accuracy of 95.83% average classifying exercise motion state using the proposed raw signal. It confirmed that raw signals have more impact than using sensor-fused Euler and joint angles in the state identification prediction model.","PeriodicalId":120331,"journal":{"name":"Int. J. Interdiscip. Telecommun. Netw.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126247473","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Weighted Multiple Linear Regression Model for Mobile Location Estimation in GSM Network","authors":"L. Ezema, C. Ani","doi":"10.4018/ijitn.2020010105","DOIUrl":"https://doi.org/10.4018/ijitn.2020010105","url":null,"abstract":"The numbers of crimes and accidents, among other challenging issues, requiring a mobile application with localization capabilities are on the increase. Yet there is under-utilization of location information provided by mobile phones. The accuracy and cost of implementation of mobile position localization on cellular network have been an issue of research interest. In this paper, the statistical modelling of mobile station (MS) position location was carried out using weighted multiple linear regressions (WMLR) method. The proposed statistical modelling approach was based on received signal strength (RSS) technique. The model improved localization accuracy. The model's simulated results were analysed and compared with the existing MLR using real measured data collected from GSM network in a light urban environment in Enugu, Nigeria.","PeriodicalId":120331,"journal":{"name":"Int. J. Interdiscip. Telecommun. Netw.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114346424","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Theodoros Mavroeidakos, N. Tsolis, D. Vergados, S. Kotsopoulos
{"title":"Attack-Tree Based Risk Assessment on Cloud-Oriented Wireless Body Area Network","authors":"Theodoros Mavroeidakos, N. Tsolis, D. Vergados, S. Kotsopoulos","doi":"10.4018/IJITN.2019100105","DOIUrl":"https://doi.org/10.4018/IJITN.2019100105","url":null,"abstract":"Machine-to-machine (M2M) communication is an emerging technology with unrivaled benefits in the fields of e Health and m-Health. The wireless body area networks (WBANs) consist of a major subdomain of M2M communications. The WBANs coupled with the Cloud Computing (CC) paradigm introduce a supreme infrastructure in terms of performance and Quality of Services (QoS) for the development of eHealth applications. In this article, a risk assessment aiming to disclose potential threats and highlight exploitation of health care services, is introduced. The proposed assessment is based upon the implementation of a series of steps. Initially, the health care WBAN-CC infrastructure is scrutinized; then, its threats' taxonomy is identified. Then, a risk assessment is carried out based on an attack-tree consisting of the most hazardous threats against Personally Identifiable Information (PII) disclosure. Thus, the implementation of several countermeasures is realized as a means to mitigate gaps.","PeriodicalId":120331,"journal":{"name":"Int. J. Interdiscip. Telecommun. Netw.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129468407","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fiber-Optic Based Solutions for Long-Tunnels Radio Coverage and Surveillance","authors":"M. Nahas","doi":"10.4018/IJITN.2019100103","DOIUrl":"https://doi.org/10.4018/IJITN.2019100103","url":null,"abstract":"This article proposes fiber-optic based solutions for radio coverage and surveillance inside long road tunnels. The study is suitable for application in areas where many long mountain tunnels exist such as the well-known city of Mecca and its surrounding pilgrimage places. These particular tunnels accommodate plenty of vehicles and pedestrians during the pilgrimage period while the wireless coverage inside the tunnels is at risk and is totally lost far from the tunnel entrances. This in turn hinders emergency communications during the rush times. This research discusses ways to enhance the communication and surveillance ability inside such tunnels so that risks and accidents can be prevented, thus large number of pilgrims can be saved.","PeriodicalId":120331,"journal":{"name":"Int. J. Interdiscip. Telecommun. Netw.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125612461","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}