Estimating the asymmetrical influence of foreign direct investment is the primary goal of the current study. In addition, further controlled variables affect environmental degradation in OIC nations. Due to this, current research employs the asymmetric (NPARDL) approach and the data period from 1980 to 2021 to estimate about viability of the EKC (environmental Kuznets curve) theory. The study utilized greenhouse gas (GHG) including emissions of carbon dioxide (CO2), nitrous oxide (N2O), methane (CH4), and ecological footprint as substantial parameters of environmental quality. A nonlinear link between foreign direct investments, trade openness, economic growth, urbanization, energy consumption, and environmental pollution with CO2, N2O, CH4, and ecological footprint in the OIC nations is confirmed by the study's outcomes, which however reveals inconsistent results. Furthermore, the results also show that wrong conclusions might result from disregarding intrinsic nonlinearities. The study's conclusions provide the most important recommendations for decision-makers.
Reconfigurable antennas have received much attention in RF energy harvesting models owing to their selectivity for operating frequency and polarization. The characteristic of having frequency selectivity and polarization selectivity can be termed as frequency diversity and polarization diversity, respectively. This paper investigates a rectenna device with a new proposed topology in order to eliminate coupling between input and output lines and increase the rectification efficiency with the use of single feed hybrid reconfigurable antenna, switch between 28GHz and 38GHz frequency. Moreover, it is designed to charge a rechargeable battery of 1watt(W). The Reconfiguration mechanism is realized by electronically controlling different states of Switches. PIN Diode (as RLC Equivalent circuit) is used as a switch for ON/OFF states. This antenna mainly comprises rectangular shaped patches (28GHz and 38GHz) with Triango-Truncated edge at the corners. Eighteen PIN Diodes are placed symmetrically throughout the antenna presenting as, S1 & S2 for frequency reconfiguration, S3 to S6 & S7 to S10 connects Triango Truncated edge at the corners for polarization reconfiguration, and for radiation pattern reconfiguration at S11 to S14 & S15 to S18 has been used. The proposed antenna model is capable of simultaneously changing, the radiation patterns as clock and anti-clockwise directions at ±90-degree shift in E and H planes, circularly polarized (CP) states among, Linear Polarization (LP), Right Hand Circularly Polarization (RHCP), and Left Hand Circularly Polarization (LHCP). The current design describes using single antenna for energy harvesting and 5G mobile communication application. This would lead to higher output currents, leading to the ability to efficiently charge a wide variety of batteries. A fully functional prototype has been designed, fabricated and its compound reconfiguration characteristics have been validated for simulated and measured results. For validation of results, the experimental results and the simulation results from the proposed mathematical model were made into comparison, and excellent correlation between the measured and simulated results was obtained.
The application of phase change materials (PCMs) in green buildings has been increasing rapidly. PCM applications in green buildings include several development models. This paper briefly surveys the recent research and development activities of PCM technology in building applications. Firstly, a basic description of phase change and their principles is provided; the classification and applications of PCMs are also included. Secondly, PCM models in buildings are reviewed and discussed according to the wall, roof, floor, and cooling systems. Finally, conclusions are presented based on the collected data.
BACKGROUND AND PURPOSE: Evaluation of health information systems (HIS) enables the assessment of the extent to which HIS are fulfilling their objectives in supporting the services of healthcare delivery. This paper presents an overview of evaluation in health informatics and information systems.
METHODS: Literature review on discourses, dimensions and methods of HIS and IS evaluation. A critical appraisal of selected HIS and IS evaluation frameworks is undertaken in order to identify HIS evaluation dimensions and measures. The frameworks are compared based on their inclusion of human, organizational and technological factors.
RESULTS: We found that an increasing number of evaluation studies deal with two distinct trends of HIS: one considers human and organizational issues and the other is concerned with the employment of a subjectivist approach. Our review indicates that current evaluation methods complement each other in that they evaluate different aspects of HIS and they can be improved upon.
CONCLUSIONS: Evaluation is complex; it is easy to measure many things but not necessarily the right ones. Nevertheless, it is possible to consider, a HIS evaluation framework with more comprehensive and specific measures that would incorporate technological, human and organizational issues to facilitate HIS evaluation.
Spectrum scarcity is a major challenge in wireless communications systems requiring efficient usage and utilization. Cognitive radio network (CRN) is found as a promising technique to solve this problem of spectrum scarcity. It allows licensed and unlicensed users to share the same licensed spectrum band. Interference resulting from cognitive radios (CRs) has undesirable effects on quality of service (QoS) of both licensed and unlicensed systems where it causes degradation in received signal-to-noise ratio (SIR) of users. Power control is one of the most important techniques that can be used to mitigate interference and guarantee QoS in both systems. In this paper, we develop a new approach of a distributed power control for CRN based on utility and pricing. QoS of CR user is presented as a utility function via pricing and a distributed power control as a non-cooperative game in which users maximize their net utility (utility-price). We define the price as a real function of transmit power to increase pricing charge of the farthest CR users. We prove that the power control game proposed in this study has Nash Equilibrium as well as it is unique. The obtained results show that the proposed power control algorithm based on a new utility function has a significant reduction in transmit power consumption and high improvement in speed of convergence.
This paper describes a system using lensed optical fiber sensors that are arranged in the form of two orthogonal projections. The sensors are placed around a process vessel for upstream and downstream measurements. The purpose of the system is for on-line monitoring of particles and droplets being conveyed by a fluid. The lenses were constructed using a custom heating fixture. The fixture enables the lenses to be constructed with similar radii resulting in identical characteristics with minimum differences in transmitted intensity and emission angle. By collimating radiation from two halogen bulbs, radiation can be obtained by the sensors with radiation intensity related to the nature of the media. Each sensor interrogates a finite section of the measurement section. Each sensor provides a view. Parallel sensors provide a projection. Signal processing is carried out on the measured data in the time and frequency domains to investigate the latent information present in the flow signals.
The new and groundbreaking real-time remote healthcare monitoring system on sensor-based mobile health (mHealth) authentication in telemedicine has considerably bounded and dispersed communication components. mHealth, an attractive part in telemedicine architecture, plays an imperative role in patient security and privacy and adapts different sensing technologies through many built-in sensors. This study aims to improve sensor-based defence and attack mechanisms to ensure patient privacy in client side when using mHealth. Thus, a multilayer taxonomy was conducted to attain the goal of this study. Within the first layer, real-time remote monitoring studies based on sensor technology for telemedicine application were reviewed and analysed to examine these technologies and provide researchers with a clear vision of security- and privacy-based sensors in the telemedicine area. An extensive search was conducted to find articles about security and privacy issues, review related applications comprehensively and establish the coherent taxonomy of these articles. ScienceDirect, IEEE Xplore and Web of Science databases were investigated for articles on mHealth in telemedicine-based sensor. A total of 3064 papers were collected from 2007 to 2017. The retrieved articles were filtered according to the security and privacy of sensor-based telemedicine applications. A total of 19 articles were selected and classified into two categories. The first category, 57.89% (n = 11/19), included survey on telemedicine articles and their applications. The second category, 42.1% (n = 8/19), included articles contributed to the three-tiered architecture of telemedicine. The collected studies improved the essential need to add another taxonomy layer and review the sensor-based smartphone authentication studies. This map matching for both taxonomies was developed for this study to investigate sensor field comprehensively and gain access to novel risks and benefits of the mHealth security in telemedicine application. The literature on sensor-based smartphones in the second layer of our taxonomy was analysed and reviewed. A total of 599 papers were collected from 2007 to 2017. In this layer, we obtained a final set of 81 articles classified into three categories. The first category of the articles [86.41% (n = 70/81)], where sensor-based smartphones were examined by utilising orientation sensors for user authentication, was used. The second category [7.40% (n = 6/81)] included attack articles, which were not intensively included in our literature analysis. The third category [8.64% (n = 7/81)] included 'other' articles. Factors were considered to understand fully the various contextual aspects of the field in published studies. The characteristics included the motivation and challenges related to sensor-based authentication of smartphones encountered by researchers and the recommendations to strengthen this critical area of research. Finally, many studies on the sensor-based smartphone in the second layer have focused on enhancing accurate authentication because sensor-based smartphones require sensors that could authentically secure mHealth.
A number of primate census techniques have been developed over the past half-century, each of which have advantages and disadvantages in terms of resources required by researchers (e.g., time and costs), availability of technologies, and effectiveness in different habitat types. This study aims to explore the effectiveness of a thermal imaging technique to estimate the group size of different primate species populations in a degraded riparian forest in the Lower Kinabatangan Wildlife Sanctuary (LKWS), Sabah. We compared this survey technique to the conventional visual counting method along the riverbank. For 38 days, a total of 138 primate groups were observed by thermal camera and visually throughout the study. Optimal conditions for the thermal camera were clear weather, not more than 100 m distance from the observer to the targeted area, boat speed ranging between 5 and 12 km/h, and early morning between 04:30 and 05:30 am. The limitations of the thermal cameras include the inability to identify individual species, sexes, age classes, and also to discern between animals closely aggregated (i.e., mothers with attached infants). Despite these limitations with the thermal camera technique, 1.78 times more primates were detected than counting by eye (p
Wireless capsule endoscopy (WCE) is a promising technology for direct diagnosis of the entire small bowel to detect lethal diseases, including cancer and obscure gastrointestinal bleeding (OGIB). To improve the quality of diagnosis, some vital specifications of WCE such as image resolution, frame rate and working time need to be improved. Additionally, future multi-functioning robotic capsule endoscopy (RCE) units may utilize advanced features such as active system control over capsule motion, drug delivery systems, semi-surgical tools and biopsy. However, the inclusion of the above advanced features demands additional power that make conventional power source methods impractical. In this regards, wireless power transmission (WPT) system has received attention among researchers to overcome this problem. Systematic reviews on techniques of using WPT for WCE are limited, especially when involving the recent technological advancements. This paper aims to fill that gap by providing a systematic review with emphasis on the aspects related to the amount of transmitted power, the power transmission efficiency, the system stability and patient safety. It is noted that, thus far the development of WPT system for this WCE application is still in initial stage and there is room for improvements, especially involving system efficiency, stability, and the patient safety aspects.
We propose an Advanced Mobility Handover scheme (AMH) in this paper for seamless mobility in MIPv6-based wireless networks. In the proposed scheme, the mobile node utilizes a unique home IPv6 address developed to maintain communication with other corresponding nodes without a care-of-address during the roaming process. The IPv6 address for each MN during the first round of AMH process is uniquely identified by HA using the developed MN-ID field as a global permanent, which is identifying uniquely the IPv6 address of MN. Moreover, a temporary MN-ID is generated by access point each time an MN is associated with a particular AP and temporarily saved in a developed table inside the AP. When employing the AMH scheme, the handover process in the network layer is performed prior to its default time. That is, the mobility handover process in the network layer is tackled by a trigger developed AMH message to the next access point. Thus, a mobile node keeps communicating with the current access point while the network layer handover is executed by the next access point. The mathematical analyses and simulation results show that the proposed scheme performs better as compared with the existing approaches.
We propose an adaptive handover prediction (AHP) scheme for seamless mobility based wireless networks. That is, the AHP scheme incorporates fuzzy logic with AP prediction process in order to lend cognitive capability to handover decision making. Selection metrics, including received signal strength, mobile node relative direction towards the access points in the vicinity, and access point load, are collected and considered inputs of the fuzzy decision making system in order to select the best preferable AP around WLANs. The obtained handover decision which is based on the calculated quality cost using fuzzy inference system is also based on adaptable coefficients instead of fixed coefficients. In other words, the mean and the standard deviation of the normalized network prediction metrics of fuzzy inference system, which are collected from available WLANs are obtained adaptively. Accordingly, they are applied as statistical information to adjust or adapt the coefficients of membership functions. In addition, we propose an adjustable weight vector concept for input metrics in order to cope with the continuous, unpredictable variation in their membership degrees. Furthermore, handover decisions are performed in each MN independently after knowing RSS, direction toward APs, and AP load. Finally, performance evaluation of the proposed scheme shows its superiority compared with representatives of the prediction approaches.
Wireless sensor networks (WSNs) are ubiquitous and pervasive, and therefore; highly susceptible to a number of security attacks. Denial of Service (DoS) attack is considered the most dominant and a major threat to WSNs. Moreover, the wormhole attack represents one of the potential forms of the Denial of Service (DoS) attack. Besides, crafting the wormhole attack is comparatively simple; though, its detection is nontrivial. On the contrary, the extant wormhole defense methods need both specialized hardware and strong assumptions to defend against static and dynamic wormhole attack. The ensuing paper introduces a novel scheme to detect wormhole attacks in a geographic routing protocol (DWGRP). The main contribution of this paper is to detect malicious nodes and select the best and the most reliable neighbors based on pairwise key pre-distribution technique and the beacon packet. Moreover, this novel technique is not subject to any specific assumption, requirement, or specialized hardware, such as a precise synchronized clock. The proposed detection method is validated by comparisons with several related techniques in the literature, such as Received Signal Strength (RSS), Authentication of Nodes Scheme (ANS), Wormhole Detection uses Hound Packet (WHOP), and Wormhole Detection with Neighborhood Information (WDI) using the NS-2 simulator. The analysis of the simulations shows promising results with low False Detection Rate (FDR) in the geographic routing protocols.
This paper presents a new practical QPSK receiver that uses digitized samples of incoming QPSK analog signal to determine the phase of the QPSK symbol. The proposed technique is more robust to phase noise and consumes up to 89.6% less power for signal detection in demodulation operation. On the contrary, the conventional QPSK demodulation process where it uses coherent detection technique requires the exact incoming signal frequency; thus, any variation in the frequency of the local oscillator or incoming signal will cause phase noise. A software simulation of the proposed design was successfully carried out using MATLAB Simulink software platform. In the conventional system, at least 10 dB signal to noise ratio (SNR) is required to achieve the bit error rate (BER) of 10(-6), whereas, in the proposed technique, the same BER value can be achieved with only 5 dB SNR. Since some of the power consuming elements such as voltage control oscillator (VCO), mixer, and low pass filter (LPF) are no longer needed, the proposed QPSK demodulator will consume almost 68.8% to 99.6% less operational power compared to conventional QPSK demodulator.
Circularly polarized (CP) dual frequency cross-shaped slotted patch antenna on 1.575 mm thick glass microfiber reinforced polytetrafluoroethylene (PTFE) composite material substrate is designed and fabricated for satellite applications. Asymmetric cross-shaped slots are embedded in the middle of the square patch for CP radiation and four hexagonal slots are etched on the four sides of the square patch for desired dual frequency. Different substrate materials have been analysed to achieve the desired operating band. The experimental results show that the impedance bandwidth is approximately 30 MHz (2.16 GHz to 2.19 GHz) for lower band and 40 MHz (3.29 GHz to 3.33 GHz) for higher band with an average peak gain of 6.59 dBiC and 5.52 dBiC, respectively. Several optimizations are performed to obtain the values of the antenna physical parameters. Moreover, the proposed antenna possesses compactness, light weight, simplicity, low cost, and circularly polarized. It is an attractive candidate for dual band satellite antennas where lower band can be used for uplink and upper band can be used for downlink.
Over-the-air dissemination of code updates in wireless sensor networks have been researchers' point of interest in the last few years, and, more importantly, security challenges toward the remote propagation of code updating have occupied the majority of efforts in this context. Many security models have been proposed to establish a balance between the energy consumption and security strength, having their concentration on the constrained nature of wireless sensor network (WSN) nodes. For authentication purposes, most of them have used a Merkle hash tree to avoid using multiple public cryptography operations. These models mostly have assumed an environment in which security has to be at a standard level. Therefore, they have not investigated the tree structure for mission-critical situations in which security has to be at the maximum possible level (e.g., military applications, healthcare). Considering this, we investigate existing security models used in over-the-air dissemination of code updates for possible vulnerabilities, and then, we provide a set of countermeasures, correspondingly named Security Model Requirements. Based on the investigation, we concentrate on Seluge, one of the existing over-the-air programming schemes, and we propose an improved version of it, named Seluge++, which complies with the Security Model Requirements and replaces the use of the inefficient Merkle tree with a novel method. Analytical and simulation results show the improvements in Seluge++ compared to Seluge.
Due to the proliferation of handheld mobile devices, multimedia applications like Voice over IP (VoIP), video conferencing, network music, and online gaming are gaining popularity in recent years. These applications are well known to be delay sensitive and resource demanding. The mobility of mobile devices, running these applications, across different networks causes delay and service disruption. Mobile IPv6 was proposed to provide mobility support to IPv6-based mobile nodes for continuous communication when they roam across different networks. However, the Route Optimization procedure in Mobile IPv6 involves the verification of mobile node's reachability at the home address and at the care-of address (home test and care-of test) that results in higher handover delays and signalling overhead. This paper presents an enhanced procedure, time-based one-time password Route Optimization (TOTP-RO), for Mobile IPv6 Route Optimization that uses the concepts of shared secret Token, time based one-time password (TOTP) along with verification of the mobile node via direct communication and maintaining the status of correspondent node's compatibility. The TOTP-RO was implemented in network simulator (NS-2) and an analytical analysis was also made. Analysis showed that TOTP-RO has lower handover delays, packet loss, and signalling overhead with an increased level of security as compared to the standard Mobile IPv6's Return-Routability-based Route Optimization (RR-RO).
The hot water sprays are an important part of many industrial processes, where the detailed knowledge of physical phenomena involved in jet transportation, interaction, secondary breakup, evaporation, and coalescence of droplets is important to reach more efficient processes. The objective of the work was to study the water spray jet breakup dynamics, vortex cloud formation, and droplet size distribution under varying temperature and load pressure. Using a high speed camera, the spray patterns generated by axisymmetric full cone nozzles were visualized as a function water temperature and load pressure. The image analysis confirmed that the spray cone angle and width do not vary significantly with increasing Reynolds and Weber numbers at early injection phases leading to increased macroscopic spray propagation. The formation and decay of semitorus like vortex clouds were also noticed in spray structures generated at near water boiling point temperature. For the nozzle with smallest orifice diameter (1.19 mm), these vortex clouds were very clear at 90°C heating temperature and 1 bar water load pressure. In addition, the sauter mean diameter (SMD) of the spray droplets was also measured by using Phase Doppler Anemometry (PDA) at different locations downstream of the nozzle exit. It was noticed that SMD varies slightly w.r.t. position when measured at room temperature whereas at higher temperature values, it became almost constant at distance of 55 mm downstream of the nozzle exit.
Gait stability is primary in assessing individuals with high risk of falling, particularly the elderly. Custom made self-adjustable wireless gyroscope suit is used as a sensing device to quantify gait stability. A nonlinear time series analysis i.e. maximum Lyapunov exponent (λ*) was employed to estimate the short term and long term stability and it is closely related to the ability of human neuro-muscular control system in maintaining gait stability. Experimental analysis and tests validated the efficacy of this novel approach. The results achieved are comparable with the findings of multiple kinematic and dynamic parameters derived from optical motion capture system and force platform which are widely used as gold standard.
Sensing and communication coverage are among the most important trade-offs in Wireless Sensor Network (WSN) design. A minimum bound of sensing coverage is vital in scheduling, target tracking and redeployment phases, as well as providing communication coverage. Some methods measure the coverage as a percentage value, but detailed information has been missing. Two scenarios with equal coverage percentage may not have the same Quality of Coverage (QoC). In this paper, we propose a new coverage measurement method using Delaunay Triangulation (DT). This can provide the value for all coverage measurement tools. Moreover, it categorizes sensors as 'fat', 'healthy' or 'thin' to show the dense, optimal and scattered areas. It can also yield the largest empty area of sensors in the field. Simulation results show that the proposed DT method can achieve accurate coverage information, and provides many tools to compare QoC between different scenarios.