- Li, Zilin, Hu, Jiefeng, Chan, Ka Wing
- Authors: Li, Zilin , Hu, Jiefeng , Chan, Ka Wing
- Date: 2021
- Type: Text , Journal article
- Relation: IEEE Transactions on Industry Applications Vol. 57, no. 6 (2021), p. 6362-6374
- Full Text: false
- Reviewed:
- Description: Unlike a synchronous generator that could withstand a large overcurrent, an inverter-based distributed generation (DG) has low thermal inertia, and the inverter is likely damaged by overcurrents during grid faults. In this article, a new strategy, namely positive-And negative-sequence limiting with stability enhanced P-f droop control (PNSL-SEPFC), is proposed to limit the output currents and active power of droop-controlled inverters in islanded microgrids. This strategy is easy to implement in the inverter controller and does not require any fault detection. Inverter stability is analyzed mathematically, which gives guidelines to design the parameters of the PNSL-SEPFC strategy. PSCAD/EMTDC simulation based on a four-DG microgrid shows that the proposed PNSL-SEPFC can limit inverter output currents and powers with better performance under both symmetrical and asymmetrical faults. Furthermore, hardware experiments demonstrate that the proposed PNSL-SEPFC can ensure the inverters riding through grid faults safely and stably. (A video of experimental waveforms is attached.). © 1972-2012 IEEE.
Implementation of evidence-based weekend service recommendations for allied health managers : a cluster randomised controlled trial protocol
- Sarkies, Mitchell, White, Jennifer, Morris, Meg, Taylor, Nicholas, Martin, Jennifer
- Authors: Sarkies, Mitchell , White, Jennifer , Morris, Meg , Taylor, Nicholas , Martin, Jennifer
- Date: 2018
- Type: Text , Journal article
- Relation: Implementation Science Vol. 13, no. 1 (2018), p.
- Full Text:
- Reviewed:
- Description: Background: It is widely acknowledged that health policy and practice do not always reflect current research evidence. Whether knowledge transfer from research to practice is more successful when specific implementation approaches are used remains unclear. A model to assist engagement of allied health managers and clinicians with research implementation could involve disseminating evidence-based policy recommendations, along with the use of knowledge brokers. We developed such a model to aid decision-making for the provision of weekend allied health services. This protocol outlines the design and methods for a multi-centre cluster randomised controlled trial to evaluate the success of research implementation strategies to promote evidence-informed weekend allied health resource allocation decisions, especially in hospital managers. Methods: This multi-centre study will be a three-group parallel cluster randomised controlled trial. Allied health managers from Australian and New Zealand hospitals will be randomised to receive either (1) an evidence-based policy recommendation document to guide weekend allied health resource allocation decisions, (2) the same policy recommendation document with support from a knowledge broker to help implement weekend allied health policy recommendations, or (3) a usual practice control group. The primary outcome will be alignment of weekend allied health service provision with policy recommendations. This will be measured by the number of allied health service events (occasions of service) occurring on weekends as a proportion of total allied health service events for the relevant hospital wards at baseline and 12-month follow-up. Discussion: Evidence-based policy recommendation documents communicate key research findings in an accessible format. This comparatively low-cost research implementation strategy could be combined with using a knowledge broker to work collaboratively with decision-makers to promote knowledge transfer. The results will assist managers to make decisions on resource allocation, based on evidence. More generally, the findings will inform the development of an allied health model for translating research into practice. © 2018 The Author(s). **Please note that there are multiple authors for this article therefore only the name of the first 5 including Federation University Australia affiliate “Jennifer Martin” is provided in this record**
- Authors: Sarkies, Mitchell , White, Jennifer , Morris, Meg , Taylor, Nicholas , Martin, Jennifer
- Date: 2018
- Type: Text , Journal article
- Relation: Implementation Science Vol. 13, no. 1 (2018), p.
- Full Text:
- Reviewed:
- Description: Background: It is widely acknowledged that health policy and practice do not always reflect current research evidence. Whether knowledge transfer from research to practice is more successful when specific implementation approaches are used remains unclear. A model to assist engagement of allied health managers and clinicians with research implementation could involve disseminating evidence-based policy recommendations, along with the use of knowledge brokers. We developed such a model to aid decision-making for the provision of weekend allied health services. This protocol outlines the design and methods for a multi-centre cluster randomised controlled trial to evaluate the success of research implementation strategies to promote evidence-informed weekend allied health resource allocation decisions, especially in hospital managers. Methods: This multi-centre study will be a three-group parallel cluster randomised controlled trial. Allied health managers from Australian and New Zealand hospitals will be randomised to receive either (1) an evidence-based policy recommendation document to guide weekend allied health resource allocation decisions, (2) the same policy recommendation document with support from a knowledge broker to help implement weekend allied health policy recommendations, or (3) a usual practice control group. The primary outcome will be alignment of weekend allied health service provision with policy recommendations. This will be measured by the number of allied health service events (occasions of service) occurring on weekends as a proportion of total allied health service events for the relevant hospital wards at baseline and 12-month follow-up. Discussion: Evidence-based policy recommendation documents communicate key research findings in an accessible format. This comparatively low-cost research implementation strategy could be combined with using a knowledge broker to work collaboratively with decision-makers to promote knowledge transfer. The results will assist managers to make decisions on resource allocation, based on evidence. More generally, the findings will inform the development of an allied health model for translating research into practice. © 2018 The Author(s). **Please note that there are multiple authors for this article therefore only the name of the first 5 including Federation University Australia affiliate “Jennifer Martin” is provided in this record**
Individual and occupational differences in perceived organisational culture of a central hospital in vietnam
- Nguyen, Huy, Nguyen, Au, Nguyen, Thu, Nguyen, Ha, Bui, Hien
- Authors: Nguyen, Huy , Nguyen, Au , Nguyen, Thu , Nguyen, Ha , Bui, Hien
- Date: 2018
- Type: Text , Journal article
- Relation: BioMed Research International Vol. 2018, no. (2018), p.
- Full Text:
- Reviewed:
- Description: Many hospitals in developing countries, including Vietnam, are facing the challenges of increasingly noncommunicable diseases and the financial autonomy policy from the government. To adapt to this new context requires understanding and changing the current organisational culture of the hospitals. However, little has been known about this in resource-constrained healthcare settings. The objectives of this study were to examine the four characteristics of the organisational culture and test selected individual and occupational differences in the organisational culture of a Vietnam central hospital. In a cross-sectional study using the Organisation Culture Assessment Instrument (OCAI) with the Competing Value Framework (CVF), including 4 factors, Clan, Adhocracy, Hierarchy, and Market, health workers currently working at Quang Nam General Hospital were interviewed. The results indicated the current cultural model was more internally focused with two dominant cultures, Clan and Hierarchy, while, for the desired model, the Clan culture was the most expected one. Comparing between the current and desired pattern, the down trend was found for all types of culture, except the Clan culture, and there were significant differences by domains of organisational culture. Furthermore, the current and desired models were differently distributed by key individual characteristics. These differences have raised a number of interesting directions for future research. They also suggest that, to build a hospital organisational culture to suit both current and future contexts as per employees' assessment and expectation, it is important to take individual and institutional variations into account. © 2018 Huy Nguyen Van et al. **Please note that there are multiple authors for this article therefore only the name of the first 5 including Federation University Australia affiliate “Huy Nguyen” is provided in this record**
- Authors: Nguyen, Huy , Nguyen, Au , Nguyen, Thu , Nguyen, Ha , Bui, Hien
- Date: 2018
- Type: Text , Journal article
- Relation: BioMed Research International Vol. 2018, no. (2018), p.
- Full Text:
- Reviewed:
- Description: Many hospitals in developing countries, including Vietnam, are facing the challenges of increasingly noncommunicable diseases and the financial autonomy policy from the government. To adapt to this new context requires understanding and changing the current organisational culture of the hospitals. However, little has been known about this in resource-constrained healthcare settings. The objectives of this study were to examine the four characteristics of the organisational culture and test selected individual and occupational differences in the organisational culture of a Vietnam central hospital. In a cross-sectional study using the Organisation Culture Assessment Instrument (OCAI) with the Competing Value Framework (CVF), including 4 factors, Clan, Adhocracy, Hierarchy, and Market, health workers currently working at Quang Nam General Hospital were interviewed. The results indicated the current cultural model was more internally focused with two dominant cultures, Clan and Hierarchy, while, for the desired model, the Clan culture was the most expected one. Comparing between the current and desired pattern, the down trend was found for all types of culture, except the Clan culture, and there were significant differences by domains of organisational culture. Furthermore, the current and desired models were differently distributed by key individual characteristics. These differences have raised a number of interesting directions for future research. They also suggest that, to build a hospital organisational culture to suit both current and future contexts as per employees' assessment and expectation, it is important to take individual and institutional variations into account. © 2018 Huy Nguyen Van et al. **Please note that there are multiple authors for this article therefore only the name of the first 5 including Federation University Australia affiliate “Huy Nguyen” is provided in this record**
Performance analysis of priority-based IEEE 802.15.6 protocol in saturated traffic conditions
- Ullah, Sana, Tovar, Eduardo, Kim, Ki, Kim, Kyong, Imran, Muhammad
- Authors: Ullah, Sana , Tovar, Eduardo , Kim, Ki , Kim, Kyong , Imran, Muhammad
- Date: 2018
- Type: Text , Journal article
- Relation: IEEE Access Vol. 6, no. (2018), p. 66198-66209
- Full Text:
- Reviewed:
- Description: Recent advancement in internet of medical things has enabled deployment of miniaturized, intelligent, and low-power medical devices in, on, or around a human body for unobtrusive and remote health monitoring. The IEEE 802.15.6 standard facilitates such monitoring by enabling low-power and reliable wireless communication between the medical devices. The IEEE 802.15.6 standard employs a carrier sense multiple access with collision avoidance protocol for resource allocation. It utilizes a priority-based backoff procedure by adjusting the contention window bounds of devices according to user requirements. As the performance of this protocol is considerably affected when the number of devices increases, we propose an accurate analytical model to estimate the saturation throughput, mean energy consumption, and mean delay over the number of devices. We assume an error-prone channel with saturated traffic conditions. We determine the optimal performance bounds for a fixed number of devices in different priority classes with different values of bit error ratio. We conclude that high-priority devices obtain quick and reliable access to the error-prone channel compared to low-priority devices. The proposed model is validated through extensive simulations. The performance bounds obtained in our analysis can be used to understand the tradeoffs between different priority levels and network performance. © 2018 IEEE.
- Authors: Ullah, Sana , Tovar, Eduardo , Kim, Ki , Kim, Kyong , Imran, Muhammad
- Date: 2018
- Type: Text , Journal article
- Relation: IEEE Access Vol. 6, no. (2018), p. 66198-66209
- Full Text:
- Reviewed:
- Description: Recent advancement in internet of medical things has enabled deployment of miniaturized, intelligent, and low-power medical devices in, on, or around a human body for unobtrusive and remote health monitoring. The IEEE 802.15.6 standard facilitates such monitoring by enabling low-power and reliable wireless communication between the medical devices. The IEEE 802.15.6 standard employs a carrier sense multiple access with collision avoidance protocol for resource allocation. It utilizes a priority-based backoff procedure by adjusting the contention window bounds of devices according to user requirements. As the performance of this protocol is considerably affected when the number of devices increases, we propose an accurate analytical model to estimate the saturation throughput, mean energy consumption, and mean delay over the number of devices. We assume an error-prone channel with saturated traffic conditions. We determine the optimal performance bounds for a fixed number of devices in different priority classes with different values of bit error ratio. We conclude that high-priority devices obtain quick and reliable access to the error-prone channel compared to low-priority devices. The proposed model is validated through extensive simulations. The performance bounds obtained in our analysis can be used to understand the tradeoffs between different priority levels and network performance. © 2018 IEEE.
Extending the technology acceptance model for use of e-learning systems by digital learners
- Hanif, Aamer, Jamal, Faheem, Imran, Muhammad
- Authors: Hanif, Aamer , Jamal, Faheem , Imran, Muhammad
- Date: 2018
- Type: Text , Journal article
- Relation: IEEE Access Vol. 6, no. (2018), p. 73395-73404
- Full Text:
- Reviewed:
- Description: Technology-based learning systems enable enhanced student learning in higher-education institutions. This paper evaluates the factors affecting behavioral intention of students toward using e-learning systems in universities to augment classroom learning. Based on the technology acceptance model, this paper proposes six external factors that influence the behavioral intention of students toward use of e-learning. A quantitative approach involving structural equation modeling is adopted, and research data collected from 437 undergraduate students enrolled in three academic programs is used for analysis. Results indicate that subjective norm, perception of external control, system accessibility, enjoyment, and result demonstrability have a significant positive influence on perceived usefulness and on perceived ease of use of the e-learning system. This paper also examines the relevance of some previously used external variables, e.g., self-efficacy, experience, and computer anxiety, for present-world students who have been brought up as digital learners and have higher levels of computer literacy and experience. © 2018 IEEE.
- Authors: Hanif, Aamer , Jamal, Faheem , Imran, Muhammad
- Date: 2018
- Type: Text , Journal article
- Relation: IEEE Access Vol. 6, no. (2018), p. 73395-73404
- Full Text:
- Reviewed:
- Description: Technology-based learning systems enable enhanced student learning in higher-education institutions. This paper evaluates the factors affecting behavioral intention of students toward using e-learning systems in universities to augment classroom learning. Based on the technology acceptance model, this paper proposes six external factors that influence the behavioral intention of students toward use of e-learning. A quantitative approach involving structural equation modeling is adopted, and research data collected from 437 undergraduate students enrolled in three academic programs is used for analysis. Results indicate that subjective norm, perception of external control, system accessibility, enjoyment, and result demonstrability have a significant positive influence on perceived usefulness and on perceived ease of use of the e-learning system. This paper also examines the relevance of some previously used external variables, e.g., self-efficacy, experience, and computer anxiety, for present-world students who have been brought up as digital learners and have higher levels of computer literacy and experience. © 2018 IEEE.
Technology-assisted decision support system for efficient water utilization : a real-time testbed for irrigation using wireless sensor networks
- Khan, Rahim, Ali, Ihsan, Zakarya, Muhammad, Ahmad, Mushtaq, Imran, Muhammad, Shoaib, Muhammad
- Authors: Khan, Rahim , Ali, Ihsan , Zakarya, Muhammad , Ahmad, Mushtaq , Imran, Muhammad , Shoaib, Muhammad
- Date: 2018
- Type: Text , Journal article
- Relation: IEEE Access Vol. 6, no. (2018), p. 25686-25697
- Full Text:
- Reviewed:
- Description: Scientific organizations and researchers are eager to apply recent technological advancements, such as sensors and actuators, in different application areas, including environmental monitoring, creation of intelligent buildings, and precision agriculture. Technology-assisted irrigation for agriculture is a major research innovation which eases the work of farmers and prevents water wastage. Wireless sensor networks (WSNs) are used as sensor nodes that directly interact with the physical environment and provide real-time data that are useful in identifying regions in need, particularly in agricultural fields. This paper presents an efficient methodology that employs WSN as a data collection tool and a decision support system (DSS). The proposed DSS can assist farmers in their manual irrigation procedures or automate irrigation activities. Water-deficient sites in both scenarios are identified by using soil moisture and environmental data sensors. However, the proposed system's accuracy is directly proportional to the accuracy of dynamic data generated by the deployed WSN. A simplified outlier-detection algorithm is thus presented and integrated with the proposed DSS to fine-tune the collected data prior to processing. The complexity of the algorithm is O(1) for dynamic datasets generated by sensor nodes and O(n) for static datasets. Different issues in technology-assisted irrigation management and their solutions are also addressed. © 2013 IEEE.
- Authors: Khan, Rahim , Ali, Ihsan , Zakarya, Muhammad , Ahmad, Mushtaq , Imran, Muhammad , Shoaib, Muhammad
- Date: 2018
- Type: Text , Journal article
- Relation: IEEE Access Vol. 6, no. (2018), p. 25686-25697
- Full Text:
- Reviewed:
- Description: Scientific organizations and researchers are eager to apply recent technological advancements, such as sensors and actuators, in different application areas, including environmental monitoring, creation of intelligent buildings, and precision agriculture. Technology-assisted irrigation for agriculture is a major research innovation which eases the work of farmers and prevents water wastage. Wireless sensor networks (WSNs) are used as sensor nodes that directly interact with the physical environment and provide real-time data that are useful in identifying regions in need, particularly in agricultural fields. This paper presents an efficient methodology that employs WSN as a data collection tool and a decision support system (DSS). The proposed DSS can assist farmers in their manual irrigation procedures or automate irrigation activities. Water-deficient sites in both scenarios are identified by using soil moisture and environmental data sensors. However, the proposed system's accuracy is directly proportional to the accuracy of dynamic data generated by the deployed WSN. A simplified outlier-detection algorithm is thus presented and integrated with the proposed DSS to fine-tune the collected data prior to processing. The complexity of the algorithm is O(1) for dynamic datasets generated by sensor nodes and O(n) for static datasets. Different issues in technology-assisted irrigation management and their solutions are also addressed. © 2013 IEEE.
Co-EEORS : cooperative energy efficient optimal relay selection protocol for underwater wireless sensor networks
- Khan, Anwar, Ali, Ihsan, Rahman, Atiq, Imran, Muhammad, Amin, Fazal, Mahmood, Hasan
- Authors: Khan, Anwar , Ali, Ihsan , Rahman, Atiq , Imran, Muhammad , Amin, Fazal , Mahmood, Hasan
- Date: 2018
- Type: Text , Journal article
- Relation: IEEE Access Vol. 6, no. (2018), p. 28777-28789
- Full Text:
- Reviewed:
- Description: Cooperative routing mitigates the adverse channel effects in the harsh underwater environment and ensures reliable delivery of packets from the bottom to the surface of water. Cooperative routing is analogous to sparse recovery in that faded copies of data packets are processed by the destination node to extract the desired information. However, it usually requires information about the two or three position coordinates of the nodes. It also requires the synchronization of the source, relay, and destination nodes. These features make the cooperative routing a challenging task as sensor nodes move with water currents. Moreover, the data packets are simply discarded if the acceptable threshold is not met at the destination. This threatens the reliable delivery of data to the final destination. To cope with these challenges, this paper proposes a cooperative energy-efficient optimal relay selection protocol for underwater wireless sensor networks. Unlike the existing routing protocols involving cooperation, the proposed scheme combines location and depth of the sensor nodes to select the destination nodes. Combination of these two parameters does not involve knowing the position coordinates of the nodes and results in selection of the destination nodes closest to the water surface. As a result, data packets are less affected by the channel properties. In addition, a source node chooses a relay node and a destination node. Data packets are sent to the destination node by the relay node as soon as the relay node receives them. This eliminates the need for synchronization among the source, relay, and destination nodes. Moreover, the destination node acknowledges the source node about the successful reception or retransmission of the data packets. This overcomes the packets drop. Based on simulation results, the proposed scheme is superior in delivering packets to the final destination than some existing techniques. © 2013 IEEE.
- Authors: Khan, Anwar , Ali, Ihsan , Rahman, Atiq , Imran, Muhammad , Amin, Fazal , Mahmood, Hasan
- Date: 2018
- Type: Text , Journal article
- Relation: IEEE Access Vol. 6, no. (2018), p. 28777-28789
- Full Text:
- Reviewed:
- Description: Cooperative routing mitigates the adverse channel effects in the harsh underwater environment and ensures reliable delivery of packets from the bottom to the surface of water. Cooperative routing is analogous to sparse recovery in that faded copies of data packets are processed by the destination node to extract the desired information. However, it usually requires information about the two or three position coordinates of the nodes. It also requires the synchronization of the source, relay, and destination nodes. These features make the cooperative routing a challenging task as sensor nodes move with water currents. Moreover, the data packets are simply discarded if the acceptable threshold is not met at the destination. This threatens the reliable delivery of data to the final destination. To cope with these challenges, this paper proposes a cooperative energy-efficient optimal relay selection protocol for underwater wireless sensor networks. Unlike the existing routing protocols involving cooperation, the proposed scheme combines location and depth of the sensor nodes to select the destination nodes. Combination of these two parameters does not involve knowing the position coordinates of the nodes and results in selection of the destination nodes closest to the water surface. As a result, data packets are less affected by the channel properties. In addition, a source node chooses a relay node and a destination node. Data packets are sent to the destination node by the relay node as soon as the relay node receives them. This eliminates the need for synchronization among the source, relay, and destination nodes. Moreover, the destination node acknowledges the source node about the successful reception or retransmission of the data packets. This overcomes the packets drop. Based on simulation results, the proposed scheme is superior in delivering packets to the final destination than some existing techniques. © 2013 IEEE.
Molecular docking interaction of mycobacterium tuberculosis lipb enzyme with isoniazid, pyrazinamide and a structurally altered drug 2, 6 dimethoxyisonicotinohydrazide
- Authors: Namasivayam, Muthuraman
- Date: 2015
- Type: Text , Journal article
- Relation: Computational biology and bioinformatics (Print) Vol. 3, no. 4 (2015), p. 45
- Full Text:
- Reviewed:
- Description: Tuberculosis is an infectious airborne disease caused by a bacterial infection that affects the lungs and other parts of the body. Vaccination against tuberculosis is available but proved to be unsuccessful against emerging multi drug and extensive drug resistant bacterial strains. This in turn raises the pressure to speed up the research on developing new and more efficient anti-tuberculosis drugs. Lipoate biosynthesis protein B (LipB) is found to play vital role in the lipoylation process in Mycobacterium tuberculosis and thus making it a very promising drug target. The existing first line drugs such as Isoniazid, Pyrazinamide and Rifampicin etc shows only profound binding affinity with this target protein. Therefore, new or modified drugs with better docking approach that exhibit a closer and stronger binding affinity is essential. This current study opens up a novel approach towards anti-tuberculosis agents by determining drugs that share similar structures with some of the best available first line drug and also happen to possess better binding affinity. In this article, a computational method by which, pristine as well certain first line and structurally modified drugs were docked with the LipB protein target; where, structurally modified 2, 6 Dimethoxyisonicotinohydrazide show superior target docking.
- Authors: Namasivayam, Muthuraman
- Date: 2015
- Type: Text , Journal article
- Relation: Computational biology and bioinformatics (Print) Vol. 3, no. 4 (2015), p. 45
- Full Text:
- Reviewed:
- Description: Tuberculosis is an infectious airborne disease caused by a bacterial infection that affects the lungs and other parts of the body. Vaccination against tuberculosis is available but proved to be unsuccessful against emerging multi drug and extensive drug resistant bacterial strains. This in turn raises the pressure to speed up the research on developing new and more efficient anti-tuberculosis drugs. Lipoate biosynthesis protein B (LipB) is found to play vital role in the lipoylation process in Mycobacterium tuberculosis and thus making it a very promising drug target. The existing first line drugs such as Isoniazid, Pyrazinamide and Rifampicin etc shows only profound binding affinity with this target protein. Therefore, new or modified drugs with better docking approach that exhibit a closer and stronger binding affinity is essential. This current study opens up a novel approach towards anti-tuberculosis agents by determining drugs that share similar structures with some of the best available first line drug and also happen to possess better binding affinity. In this article, a computational method by which, pristine as well certain first line and structurally modified drugs were docked with the LipB protein target; where, structurally modified 2, 6 Dimethoxyisonicotinohydrazide show superior target docking.
Enhancing quality-of-service conditions using a cross-layer paradigm for ad-hoc vehicular communication
- Rehman, Sabih, Arif Khan, M. Arif, Imran, Muhammad, Zia, Tanveer, Iftikhar, Mohsin
- Authors: Rehman, Sabih , Arif Khan, M. Arif , Imran, Muhammad , Zia, Tanveer , Iftikhar, Mohsin
- Date: 2017
- Type: Text , Journal article
- Relation: IEEE Access Vol. 5, no. (2017), p. 12404-12416
- Full Text:
- Reviewed:
- Description: The Internet of Vehicles (IoVs) is an emerging paradigm aiming to introduce a plethora of innovative applications and services that impose a certain quality of service (QoS) requirements. The IoV mainly relies on vehicular ad-hoc networks (VANETs) for autonomous inter-vehicle communication and road-traffic safety management. With the ever-increasing demand to design new and emerging applications for VANETs, one challenge that continues to stand out is the provision of acceptable QoS requirements to particular user applications. Most existing solutions to this challenge rely on a single layer of the protocol stack. This paper presents a cross-layer decision-based routing protocol that necessitates choosing the best multi-hop path for packet delivery to meet acceptable QoS requirements. The proposed protocol acquires the information about the channel rate from the physical layer and incorporates this information in decision making, while directing traffic at the network layer level. Key performance metrics for the system design are analyzed using extensive experimental simulation scenarios. In addition, three data rate variant solutions are proposed to cater for various application-specific requirements in highways and urban environments. © 2013 IEEE.
- Authors: Rehman, Sabih , Arif Khan, M. Arif , Imran, Muhammad , Zia, Tanveer , Iftikhar, Mohsin
- Date: 2017
- Type: Text , Journal article
- Relation: IEEE Access Vol. 5, no. (2017), p. 12404-12416
- Full Text:
- Reviewed:
- Description: The Internet of Vehicles (IoVs) is an emerging paradigm aiming to introduce a plethora of innovative applications and services that impose a certain quality of service (QoS) requirements. The IoV mainly relies on vehicular ad-hoc networks (VANETs) for autonomous inter-vehicle communication and road-traffic safety management. With the ever-increasing demand to design new and emerging applications for VANETs, one challenge that continues to stand out is the provision of acceptable QoS requirements to particular user applications. Most existing solutions to this challenge rely on a single layer of the protocol stack. This paper presents a cross-layer decision-based routing protocol that necessitates choosing the best multi-hop path for packet delivery to meet acceptable QoS requirements. The proposed protocol acquires the information about the channel rate from the physical layer and incorporates this information in decision making, while directing traffic at the network layer level. Key performance metrics for the system design are analyzed using extensive experimental simulation scenarios. In addition, three data rate variant solutions are proposed to cater for various application-specific requirements in highways and urban environments. © 2013 IEEE.
A blockchain-based solution for enhancing security and privacy in smart factory
- Wan, Jafu, Li, Jiapeng, Imran, Muhammad, Li, Di
- Authors: Wan, Jafu , Li, Jiapeng , Imran, Muhammad , Li, Di
- Date: 2019
- Type: Text , Journal article
- Relation: IEEE Transactions on Industrial Informatics Vol. 15, no. 6 (2019), p. 3652-3660
- Full Text: false
- Reviewed:
- Description: Through the Industrial Internet of Things (IIoT), a smart factory has entered the booming period. However, as the number of nodes and network size become larger, the traditional IIoT architecture can no longer provide effective support for such enormous system. Therefore, we introduce the Blockchain architecture, which is an emerging scheme for constructing the distributed networks, to reshape the traditional IIoT architecture. First, the major problems of the traditional IIoT architecture are analyzed, and the existing improvements are summarized. Second, we introduce a security and privacy model to help design the Blockchain-based architecture. On this basis, we decompose and reorganize the original IIoT architecture to form a new multicenter partially decentralized architecture. Then, we introduce some relative security technologies to improve and optimize the new architecture. After that we design the data interaction process and the algorithms of the architecture. Finally, we use an automatic production platform to discuss the specific implementation. The experimental results show that the proposed architecture provides better security and privacy protection than the traditional architecture. Thus, the proposed architecture represents a significant improvement of the original architecture, which provides a new direction for the IIoT development. © 2005-2012 IEEE.
Impact of node deployment and routing for protection of critical infrastructures
- Subhan, Fazli, Noreen, Madiha, Imran, Muhammad, Tariq, Moeenuddin, Khan, Asfandyar, Shoaib, Muhammad
- Authors: Subhan, Fazli , Noreen, Madiha , Imran, Muhammad , Tariq, Moeenuddin , Khan, Asfandyar , Shoaib, Muhammad
- Date: 2019
- Type: Text , Journal article
- Relation: IEEE Access Vol. 7, no. (2019), p. 11502-11514
- Full Text:
- Reviewed:
- Description: Recently, linear wireless sensor networks (LWSNs) have been eliciting increasing attention because of their suitability for applications such as the protection of critical infrastructures. Most of these applications require LWSN to remain operational for a longer period. However, the non-replenishable limited battery power of sensor nodes does not allow them to meet these expectations. Therefore, a shorter network lifetime is one of the most prominent barriers in large-scale deployment of LWSN. Unlike most existing studies, in this paper, we analyze the impact of node placement and clustering on LWSN network lifetime. First, we categorize and classify existing node placement and clustering schemes for LWSN and introduce various topologies for disparate applications. Then, we highlight the peculiarities of LWSN applications and discuss their unique characteristics. Several application domains of LWSN are described. We present three node placement strategies (i.e., linear sequential, linear parallel, and grid) and various deployment methods such as random, uniform, decreasing distance, and triangular. Extensive simulation experiments are conducted to analyze the performance of the three state-of-the-art routing protocols in the context of node deployment strategies and methods. The experimental results demonstrate that the node deployment strategies and methods significantly affect LWSN lifetime. © 2013 IEEE.
- Authors: Subhan, Fazli , Noreen, Madiha , Imran, Muhammad , Tariq, Moeenuddin , Khan, Asfandyar , Shoaib, Muhammad
- Date: 2019
- Type: Text , Journal article
- Relation: IEEE Access Vol. 7, no. (2019), p. 11502-11514
- Full Text:
- Reviewed:
- Description: Recently, linear wireless sensor networks (LWSNs) have been eliciting increasing attention because of their suitability for applications such as the protection of critical infrastructures. Most of these applications require LWSN to remain operational for a longer period. However, the non-replenishable limited battery power of sensor nodes does not allow them to meet these expectations. Therefore, a shorter network lifetime is one of the most prominent barriers in large-scale deployment of LWSN. Unlike most existing studies, in this paper, we analyze the impact of node placement and clustering on LWSN network lifetime. First, we categorize and classify existing node placement and clustering schemes for LWSN and introduce various topologies for disparate applications. Then, we highlight the peculiarities of LWSN applications and discuss their unique characteristics. Several application domains of LWSN are described. We present three node placement strategies (i.e., linear sequential, linear parallel, and grid) and various deployment methods such as random, uniform, decreasing distance, and triangular. Extensive simulation experiments are conducted to analyze the performance of the three state-of-the-art routing protocols in the context of node deployment strategies and methods. The experimental results demonstrate that the node deployment strategies and methods significantly affect LWSN lifetime. © 2013 IEEE.
- Al-Shammari, Ahmed, Zhou, Rui, Naseriparsaa, Mehdi, Liu, Chengfei
- Authors: Al-Shammari, Ahmed , Zhou, Rui , Naseriparsaa, Mehdi , Liu, Chengfei
- Date: 2019
- Type: Text , Journal article
- Relation: International Journal of Medical Informatics Vol. 126, no. (2019), p. 176-186
- Full Text: false
- Reviewed:
- Description: Background: Medical data stream clustering has become an integral part of medical decision systems since it extracts highly-sensitive information from a tremendous flow of medical data. However, clustering and maintaining of medical data streams is still a challenging task. That is because the evolving of medical data streams imposes various challenges for clustering such as the ability to discover the arbitrary shape of a cluster, the ability to group data streams without a predefined number of clusters, and the ability to maintain the data clusters dynamically. Objective: To support the online medical decisions, there is a need to address the clustering challenges. Therefore, in this paper, we propose an effective density-based clustering and dynamic maintenance framework for grouping the patients with similar symptoms into meaningful clusters and monitoring the patients’ status frequently. Methods: For clustering, we generate a set of initial medical data clusters based on the combination of Piece-wise Aggregate Approximation and the density-based spatial clustering of applications with noise called (PAA+DBSCAN) algorithm. For maintenance, when new medical data streams arrive, we maintain the initially generated medical data clusters dynamically. Since the incremental cluster maintenance is time-consuming, we further propose an Advanced Cluster Maintenance (ACM) approach to improve the performance of the dynamic cluster maintenance. Results: The experimental results on real-world medical datasets demonstrate the effectiveness and efficiency of our proposed approaches. The PAA+DBSCAN algorithm is more efficient and effective than the exact DBSCAN algorithm. Moreover, the ACM approach requires less running time in comparison with the Baseline Cluster Maintenance (BCM) approach using different tuning parameter values in all datasets. That is because the BCM approach tracks all the data points in the cluster. Conclusion: The proposed framework is capable of clustering and maintaining the medical data streams effectively by means of grouping the patients who share similar symptoms and tracking the patients status that naturally tends to be changing over time. © 2019 Elsevier B.V.
- Li, Xiaomin, Wan, Jiafu, Dai, Hong-Ning, Imran, Muhammad, Xia, Min, Celesti, Antonio
- Authors: Li, Xiaomin , Wan, Jiafu , Dai, Hong-Ning , Imran, Muhammad , Xia, Min , Celesti, Antonio
- Date: 2019
- Type: Text , Journal article
- Relation: IEEE Transactions on Industrial Informatics Vol. 15, no. 7 (2019), p. 4225-4234
- Full Text: false
- Reviewed:
- Description: At present, smart manufacturing computing framework has faced many challenges such as the lack of an effective framework of fusing computing historical heritages and resource scheduling strategy to guarantee the low-latency requirement. In this paper, we propose a hybrid computing framework and design an intelligent resource scheduling strategy to fulfill the real-time requirement in smart manufacturing with edge computing support. First, a four-layer computing system in a smart manufacturing environment is provided to support the artificial intelligence task operation with the network perspective. Then, a two-phase algorithm for scheduling the computing resources in the edge layer is designed based on greedy and threshold strategies with latency constraints. Finally, a prototype platform was developed. We conducted experiments on the prototype to evaluate the performance of the proposed framework with a comparison of the traditionally-used methods. The proposed strategies have demonstrated the excellent real-time, satisfaction degree (SD), and energy consumption performance of computing services in smart manufacturing with edge computing. © 2005-2012 IEEE.
Efficient brain tumor segmentation with multiscale two-pathway-group conventional neural networks
- Razzak, Muhammad, Imran, Muhammad, Xu, Guandong
- Authors: Razzak, Muhammad , Imran, Muhammad , Xu, Guandong
- Date: 2019
- Type: Text , Journal article
- Relation: IEEE Journal of Biomedical and Health Informatics Vol. 23, no. 5 (2019), p. 1911-1919
- Full Text:
- Reviewed:
- Description: Manual segmentation of the brain tumors for cancer diagnosis from MRI images is a difficult, tedious, and time-consuming task. The accuracy and the robustness of brain tumor segmentation, therefore, are crucial for the diagnosis, treatment planning, and treatment outcome evaluation. Mostly, the automatic brain tumor segmentation methods use hand designed features. Similarly, traditional methods of deep learning such as convolutional neural networks require a large amount of annotated data to learn from, which is often difficult to obtain in the medical domain. Here, we describe a new model two-pathway-group CNN architecture for brain tumor segmentation, which exploits local features and global contextual features simultaneously. This model enforces equivariance in the two-pathway CNN model to reduce instabilities and overfitting parameter sharing. Finally, we embed the cascade architecture into two-pathway-group CNN in which the output of a basic CNN is treated as an additional source and concatenated at the last layer. Validation of the model on BRATS2013 and BRATS2015 data sets revealed that embedding of a group CNN into a two pathway architecture improved the overall performance over the currently published state-of-the-art while computational complexity remains attractive. © 2013 IEEE.
- Authors: Razzak, Muhammad , Imran, Muhammad , Xu, Guandong
- Date: 2019
- Type: Text , Journal article
- Relation: IEEE Journal of Biomedical and Health Informatics Vol. 23, no. 5 (2019), p. 1911-1919
- Full Text:
- Reviewed:
- Description: Manual segmentation of the brain tumors for cancer diagnosis from MRI images is a difficult, tedious, and time-consuming task. The accuracy and the robustness of brain tumor segmentation, therefore, are crucial for the diagnosis, treatment planning, and treatment outcome evaluation. Mostly, the automatic brain tumor segmentation methods use hand designed features. Similarly, traditional methods of deep learning such as convolutional neural networks require a large amount of annotated data to learn from, which is often difficult to obtain in the medical domain. Here, we describe a new model two-pathway-group CNN architecture for brain tumor segmentation, which exploits local features and global contextual features simultaneously. This model enforces equivariance in the two-pathway CNN model to reduce instabilities and overfitting parameter sharing. Finally, we embed the cascade architecture into two-pathway-group CNN in which the output of a basic CNN is treated as an additional source and concatenated at the last layer. Validation of the model on BRATS2013 and BRATS2015 data sets revealed that embedding of a group CNN into a two pathway architecture improved the overall performance over the currently published state-of-the-art while computational complexity remains attractive. © 2013 IEEE.
Exact string matching algorithms : survey, issues, and future research directions
- Hakak, Saqib, Kamsin, Amirrudin, Shivakumara, Palaiahnakote, Gilkar, Gulshan, Khan, Wazir, Imran, Muhammad
- Authors: Hakak, Saqib , Kamsin, Amirrudin , Shivakumara, Palaiahnakote , Gilkar, Gulshan , Khan, Wazir , Imran, Muhammad
- Date: 2019
- Type: Text , Journal article
- Relation: IEEE Access Vol. 7, no. (2019), p. 69614-69637
- Full Text:
- Reviewed:
- Description: String matching has been an extensively studied research domain in the past two decades due to its various applications in the fields of text, image, signal, and speech processing. As a result, choosing an appropriate string matching algorithm for current applications and addressing challenges is difficult. Understanding different string matching approaches (such as exact string matching and approximate string matching algorithms), integrating several algorithms, and modifying algorithms to address related issues are also difficult. This paper presents a survey on single-pattern exact string matching algorithms. The main purpose of this survey is to propose new classification, identify new directions and highlight the possible challenges, current trends, and future works in the area of string matching algorithms with a core focus on exact string matching algorithms. © 2013 IEEE.
- Authors: Hakak, Saqib , Kamsin, Amirrudin , Shivakumara, Palaiahnakote , Gilkar, Gulshan , Khan, Wazir , Imran, Muhammad
- Date: 2019
- Type: Text , Journal article
- Relation: IEEE Access Vol. 7, no. (2019), p. 69614-69637
- Full Text:
- Reviewed:
- Description: String matching has been an extensively studied research domain in the past two decades due to its various applications in the fields of text, image, signal, and speech processing. As a result, choosing an appropriate string matching algorithm for current applications and addressing challenges is difficult. Understanding different string matching approaches (such as exact string matching and approximate string matching algorithms), integrating several algorithms, and modifying algorithms to address related issues are also difficult. This paper presents a survey on single-pattern exact string matching algorithms. The main purpose of this survey is to propose new classification, identify new directions and highlight the possible challenges, current trends, and future works in the area of string matching algorithms with a core focus on exact string matching algorithms. © 2013 IEEE.
Emergency message dissemination schemes based on congestion avoidance in VANET and vehicular FoG computing
- Ullah, Ata, Yaqoob, Shumayla, Imran, Muhammad, Ning, Huansheng
- Authors: Ullah, Ata , Yaqoob, Shumayla , Imran, Muhammad , Ning, Huansheng
- Date: 2019
- Type: Text , Journal article
- Relation: IEEE Access Vol. 7, no. (2019), p. 1570-1585
- Full Text:
- Reviewed:
- Description: With the rapid growth in connected vehicles, FoG-assisted vehicular ad hoc network (VANET) is an emerging and novel field of research. For information sharing, a number of messages are exchanged in various applications, including traffic monitoring and area-specific live weather and social aspects monitoring. It is quite challenging where vehicles' speed, direction, and density of neighbors on the move are not consistent. In this scenario, congestion avoidance is also quite challenging to avoid communication loss during busy hours or in emergency cases. This paper presents emergency message dissemination schemes that are based on congestion avoidance scenario in VANET and vehicular FoG computing. In the similar vein, FoG-assisted VANET architecture is explored that can efficiently manage the message congestion scenarios. We present a taxonomy of schemes that address message congestion avoidance. Next, we have included a discussion about comparison of congestion avoidance schemes to highlight the strengths and weaknesses. We have also identified that FoG servers help to reduce the accessibility delays and congestion as compared to directly approaching cloud for all requests in linkage with big data repositories. For the dependable applicability of FoG in VANET, we have identified a number of open research challenges. © 2013 IEEE.
- Authors: Ullah, Ata , Yaqoob, Shumayla , Imran, Muhammad , Ning, Huansheng
- Date: 2019
- Type: Text , Journal article
- Relation: IEEE Access Vol. 7, no. (2019), p. 1570-1585
- Full Text:
- Reviewed:
- Description: With the rapid growth in connected vehicles, FoG-assisted vehicular ad hoc network (VANET) is an emerging and novel field of research. For information sharing, a number of messages are exchanged in various applications, including traffic monitoring and area-specific live weather and social aspects monitoring. It is quite challenging where vehicles' speed, direction, and density of neighbors on the move are not consistent. In this scenario, congestion avoidance is also quite challenging to avoid communication loss during busy hours or in emergency cases. This paper presents emergency message dissemination schemes that are based on congestion avoidance scenario in VANET and vehicular FoG computing. In the similar vein, FoG-assisted VANET architecture is explored that can efficiently manage the message congestion scenarios. We present a taxonomy of schemes that address message congestion avoidance. Next, we have included a discussion about comparison of congestion avoidance schemes to highlight the strengths and weaknesses. We have also identified that FoG servers help to reduce the accessibility delays and congestion as compared to directly approaching cloud for all requests in linkage with big data repositories. For the dependable applicability of FoG in VANET, we have identified a number of open research challenges. © 2013 IEEE.
Adherence to antiplatelet therapy after coronary intervention among patients with myocardial infarction attending Vietnam National Heart Institute
- Luu, Ngoc, Dinh, Anh, Nguyen, Thi, Nguyen, Huy
- Authors: Luu, Ngoc , Dinh, Anh , Nguyen, Thi , Nguyen, Huy
- Date: 2019
- Type: Text , Journal article
- Relation: BioMed Research International Vol. 2019, no. (2019), p.
- Full Text:
- Reviewed:
- Description: Adherence to antiplatelet therapy is critical to successful treatment of cardiovascular conditions. However, little has been known about this issue in the context of constrained resources such as in Vietnam. The objective of this study was to examine the adherence to antiplatelet therapy among patients receiving acute myocardial infarction interventions and its associated factors. In a cross-sectional survey design, 175 adult patients revisiting Vietnam National Heart Institute diagnosed with acute myocardial infarction were approached for data collection from October 2014 to June 2015. Adherence to antiplatelet therapy was assessed by asking patients whether they took taking antiplatelet regularly as per medication (do not miss any dose at the specified time) for any type of antiplatelet (aspirin, clopidogrel, ticlopidine.) during the last month before the participants came back to take re-examinations. The results indicated that the adherence to antiplatelet therapy among patients was quite high at 1 month; it begins to decline by 6 months, 12 months, and more than 12 months (less than 1 month was 90.29%; from 1 to 6 months 88.0%, from 6 to 12 months 75.43%, and after 12 months only 46.29% of patients). Multivariable logistic regression was utilized to detect factors associated with the adherence to antiplatelet therapy. It showed that patients with average income per month of $300 or more (OR=2.92, 95% CI=1.24-6.89), distance to the hospital of less than 50km (OR=2.48, 95% CI: 1.12-5.52), taking medicine under doctor's instructions (OR=3.65; 95% CI=1.13-11.70), and timely re-examination (OR=3.99, 95% CI=1.08-14.73) were more likely to follow the therapy. In general, the study suggested that to increase the likelihood of adherence to antiplatelet therapy it is important to establish a continuous care system after discharging from hospital. © 2019 Ngoc Minh Luu et al.
- Authors: Luu, Ngoc , Dinh, Anh , Nguyen, Thi , Nguyen, Huy
- Date: 2019
- Type: Text , Journal article
- Relation: BioMed Research International Vol. 2019, no. (2019), p.
- Full Text:
- Reviewed:
- Description: Adherence to antiplatelet therapy is critical to successful treatment of cardiovascular conditions. However, little has been known about this issue in the context of constrained resources such as in Vietnam. The objective of this study was to examine the adherence to antiplatelet therapy among patients receiving acute myocardial infarction interventions and its associated factors. In a cross-sectional survey design, 175 adult patients revisiting Vietnam National Heart Institute diagnosed with acute myocardial infarction were approached for data collection from October 2014 to June 2015. Adherence to antiplatelet therapy was assessed by asking patients whether they took taking antiplatelet regularly as per medication (do not miss any dose at the specified time) for any type of antiplatelet (aspirin, clopidogrel, ticlopidine.) during the last month before the participants came back to take re-examinations. The results indicated that the adherence to antiplatelet therapy among patients was quite high at 1 month; it begins to decline by 6 months, 12 months, and more than 12 months (less than 1 month was 90.29%; from 1 to 6 months 88.0%, from 6 to 12 months 75.43%, and after 12 months only 46.29% of patients). Multivariable logistic regression was utilized to detect factors associated with the adherence to antiplatelet therapy. It showed that patients with average income per month of $300 or more (OR=2.92, 95% CI=1.24-6.89), distance to the hospital of less than 50km (OR=2.48, 95% CI: 1.12-5.52), taking medicine under doctor's instructions (OR=3.65; 95% CI=1.13-11.70), and timely re-examination (OR=3.99, 95% CI=1.08-14.73) were more likely to follow the therapy. In general, the study suggested that to increase the likelihood of adherence to antiplatelet therapy it is important to establish a continuous care system after discharging from hospital. © 2019 Ngoc Minh Luu et al.
MESH : a flexible manifold-embedded semantic hashing for cross-modal retrieval
- Zhong, Fangming, Wang, Guangze, Chen, Zhikui, Xia, Feng
- Authors: Zhong, Fangming , Wang, Guangze , Chen, Zhikui , Xia, Feng
- Date: 2020
- Type: Text , Journal article
- Relation: IEEE Access Vol. 8, no. (2020), p. 147569-147579
- Full Text:
- Reviewed:
- Description: Hashing based methods for cross-modal retrieval has been widely explored in recent years. However, most of them mainly focus on the preservation of neighborhood relationship and label consistency, while ignore the proximity of neighbors and proximity of classes, which degrades the discrimination of hash codes. And most of them learn hash codes and hashing functions simultaneously, which limits the flexibility of algorithms. To address these issues, in this article, we propose a two-step cross-modal retrieval method named Manifold-Embedded Semantic Hashing (MESH). It exploits Local Linear Embedding to model the neighborhood proximity and uses class semantic embeddings to consider the proximity of classes. By so doing, MESH can not only extract the manifold structure in different modalities, but also can embed the class semantic information into hash codes to further improve the discrimination of learned hash codes. Moreover, the two-step scheme makes MESH flexible to various hashing functions. Extensive experimental results on three datasets show that MESH is superior to 10 state-of-the-art cross-modal hashing methods. Moreover, MESH also demonstrates superiority on deep features compared with the deep cross-modal hashing method. © 2013 IEEE.
- Authors: Zhong, Fangming , Wang, Guangze , Chen, Zhikui , Xia, Feng
- Date: 2020
- Type: Text , Journal article
- Relation: IEEE Access Vol. 8, no. (2020), p. 147569-147579
- Full Text:
- Reviewed:
- Description: Hashing based methods for cross-modal retrieval has been widely explored in recent years. However, most of them mainly focus on the preservation of neighborhood relationship and label consistency, while ignore the proximity of neighbors and proximity of classes, which degrades the discrimination of hash codes. And most of them learn hash codes and hashing functions simultaneously, which limits the flexibility of algorithms. To address these issues, in this article, we propose a two-step cross-modal retrieval method named Manifold-Embedded Semantic Hashing (MESH). It exploits Local Linear Embedding to model the neighborhood proximity and uses class semantic embeddings to consider the proximity of classes. By so doing, MESH can not only extract the manifold structure in different modalities, but also can embed the class semantic information into hash codes to further improve the discrimination of learned hash codes. Moreover, the two-step scheme makes MESH flexible to various hashing functions. Extensive experimental results on three datasets show that MESH is superior to 10 state-of-the-art cross-modal hashing methods. Moreover, MESH also demonstrates superiority on deep features compared with the deep cross-modal hashing method. © 2013 IEEE.
Bio-inspired network security for 5G-enabled IoT applications
- Saleem, Kashif, Alabduljabbar, Ghadah, Alrowais, Nouf, Al-Muhtadi, Jalal, Imran, Muhammad, Rodrigues, Joel
- Authors: Saleem, Kashif , Alabduljabbar, Ghadah , Alrowais, Nouf , Al-Muhtadi, Jalal , Imran, Muhammad , Rodrigues, Joel
- Date: 2020
- Type: Text , Journal article
- Relation: IEEE access Vol. 8, no. (2020), p. 1-1
- Full Text:
- Reviewed:
- Description: Every IPv6-enabled device connected and communicating over the Internet forms the Internet of things (IoT) that is prevalent in society and is used in daily life. This IoT platform will quickly grow to be populated with billions or more objects by making every electrical appliance, car, and even items of furniture smart and connected. The 5th generation (5G) and beyond networks will further boost these IoT systems. The massive utilization of these systems over gigabits per second generates numerous issues. Owing to the huge complexity in large-scale deployment of IoT, data privacy and security are the most prominent challenges, especially for critical applications such as Industry 4.0, e-healthcare, and military. Threat agents persistently strive to find new vulnerabilities and exploit them. Therefore, including promising security measures to support the running systems, not to harm or collapse them, is essential. Nature-inspired algorithms have the capability to provide autonomous and sustainable defense and healing mechanisms. This paper first surveys the 5G network layer security for IoT applications and lists the network layer security vulnerabilities and requirements in wireless sensor networks, IoT, and 5G-enabled IoT. Second, a detailed literature review is conducted with the current network layer security methods and the bio-inspired techniques for IoT applications exchanging data packets over 5G. Finally, the bio-inspired algorithms are analyzed in the context of providing a secure network layer for IoT applications connected over 5G and beyond networks.
- Authors: Saleem, Kashif , Alabduljabbar, Ghadah , Alrowais, Nouf , Al-Muhtadi, Jalal , Imran, Muhammad , Rodrigues, Joel
- Date: 2020
- Type: Text , Journal article
- Relation: IEEE access Vol. 8, no. (2020), p. 1-1
- Full Text:
- Reviewed:
- Description: Every IPv6-enabled device connected and communicating over the Internet forms the Internet of things (IoT) that is prevalent in society and is used in daily life. This IoT platform will quickly grow to be populated with billions or more objects by making every electrical appliance, car, and even items of furniture smart and connected. The 5th generation (5G) and beyond networks will further boost these IoT systems. The massive utilization of these systems over gigabits per second generates numerous issues. Owing to the huge complexity in large-scale deployment of IoT, data privacy and security are the most prominent challenges, especially for critical applications such as Industry 4.0, e-healthcare, and military. Threat agents persistently strive to find new vulnerabilities and exploit them. Therefore, including promising security measures to support the running systems, not to harm or collapse them, is essential. Nature-inspired algorithms have the capability to provide autonomous and sustainable defense and healing mechanisms. This paper first surveys the 5G network layer security for IoT applications and lists the network layer security vulnerabilities and requirements in wireless sensor networks, IoT, and 5G-enabled IoT. Second, a detailed literature review is conducted with the current network layer security methods and the bio-inspired techniques for IoT applications exchanging data packets over 5G. Finally, the bio-inspired algorithms are analyzed in the context of providing a secure network layer for IoT applications connected over 5G and beyond networks.
A novel counterbalanced implementation study design : methodological description and application to implementation research
- Sarkies, Mitchell, Skinner, Elizabeth, Bowles, Kelly-Ann, Morris, Meg, Martin, Jennifer
- Authors: Sarkies, Mitchell , Skinner, Elizabeth , Bowles, Kelly-Ann , Morris, Meg , Martin, Jennifer
- Date: 2019
- Type: Text , Journal article
- Relation: Implementation Science Vol. 14, no. 1 (2019), p.
- Full Text:
- Reviewed:
- Description: Background: Implementation research is increasingly being recognised for optimising the outcomes of clinical practice. Frequently, the benefits of new evidence are not implemented due to the difficulties applying traditional research methodologies to implementation settings. Randomised controlled trials are not always practical for the implementation phase of knowledge transfer, as differences between individual and organisational readiness for change combined with small sample sizes can lead to imbalances in factors that impede or facilitate change between intervention and control groups. Within-cluster repeated measure designs could control for variance between intervention and control groups by allowing the same clusters to receive a sequence of conditions. Although in implementation settings, they can contaminate the intervention and control groups after the initial exposure to interventions. We propose the novel application of counterbalanced design to implementation research where repeated measures are employed through crossover, but contamination is averted by counterbalancing different health contexts in which to test the implementation strategy. Methods: In a counterbalanced implementation study, the implementation strategy (independent variable) has two or more levels evaluated across an equivalent number of health contexts (e.g. community-acquired pneumonia and nutrition for critically ill patients) using the same outcome (dependent variable). This design limits each cluster to one distinct strategy related to one specific context, and therefore does not overburden any cluster to more than one focussed implementation strategy for a particular outcome, and provides a ready-made control comparison, holding fixed. The different levels of the independent variable can be delivered concurrently because each level uses a different health context within each cluster to avoid the effect of treatment contamination from exposure to the intervention or control condition. Results: An example application of the counterbalanced implementation design is presented in a hypothetical study to demonstrate the comparison of 'video-based' and 'written-based' evidence summary research implementation strategies for changing clinical practice in community-acquired pneumonia and nutrition in critically ill patient health contexts. Conclusion: A counterbalanced implementation study design provides a promising model for concurrently investigating the success of research implementation strategies across multiple health context areas such as community-acquired pneumonia and nutrition for critically ill patients. © 2019 The Author(s). **Please note that there are multiple authors for this article therefore only the name of the first 5 including Federation University Australia affiliate “Jennifer Martin" is provided in this record**
- Authors: Sarkies, Mitchell , Skinner, Elizabeth , Bowles, Kelly-Ann , Morris, Meg , Martin, Jennifer
- Date: 2019
- Type: Text , Journal article
- Relation: Implementation Science Vol. 14, no. 1 (2019), p.
- Full Text:
- Reviewed:
- Description: Background: Implementation research is increasingly being recognised for optimising the outcomes of clinical practice. Frequently, the benefits of new evidence are not implemented due to the difficulties applying traditional research methodologies to implementation settings. Randomised controlled trials are not always practical for the implementation phase of knowledge transfer, as differences between individual and organisational readiness for change combined with small sample sizes can lead to imbalances in factors that impede or facilitate change between intervention and control groups. Within-cluster repeated measure designs could control for variance between intervention and control groups by allowing the same clusters to receive a sequence of conditions. Although in implementation settings, they can contaminate the intervention and control groups after the initial exposure to interventions. We propose the novel application of counterbalanced design to implementation research where repeated measures are employed through crossover, but contamination is averted by counterbalancing different health contexts in which to test the implementation strategy. Methods: In a counterbalanced implementation study, the implementation strategy (independent variable) has two or more levels evaluated across an equivalent number of health contexts (e.g. community-acquired pneumonia and nutrition for critically ill patients) using the same outcome (dependent variable). This design limits each cluster to one distinct strategy related to one specific context, and therefore does not overburden any cluster to more than one focussed implementation strategy for a particular outcome, and provides a ready-made control comparison, holding fixed. The different levels of the independent variable can be delivered concurrently because each level uses a different health context within each cluster to avoid the effect of treatment contamination from exposure to the intervention or control condition. Results: An example application of the counterbalanced implementation design is presented in a hypothetical study to demonstrate the comparison of 'video-based' and 'written-based' evidence summary research implementation strategies for changing clinical practice in community-acquired pneumonia and nutrition in critically ill patient health contexts. Conclusion: A counterbalanced implementation study design provides a promising model for concurrently investigating the success of research implementation strategies across multiple health context areas such as community-acquired pneumonia and nutrition for critically ill patients. © 2019 The Author(s). **Please note that there are multiple authors for this article therefore only the name of the first 5 including Federation University Australia affiliate “Jennifer Martin" is provided in this record**