The efficiency of cooperative communication protocols to increase the reliability and range of transmission for Vehicular Ad hoc Network (VANET) is proven, but identity verification and communication security are required to be ensured. Though it is difficult to maintain strong network connections between vehicles because of there high mobility, with the help of cooperative communication, it is possible to increase the communication efficiency, minimise delay, packet loss, and Packet Dropping Rate (PDR). However, cooperating with unknown or unauthorized vehicles could result in information theft, privacy leakage, vulnerable to different security attacks, etc.
View Article and Find Full Text PDFAsia Pac J Public Health
January 2021
The objective of this research is to understand the psychological and livelihood-related impacts of coronavirus disease 2019 (COVID-19) on Bangladeshi lower income group people who depend on daily earnings for their living. Following the convenience sampling method, 576 respondents were interviewed for quantitative data and 30 in-depth interviews for qualitative information in several districts of Bangladesh. To 94.
View Article and Find Full Text PDFSoftware-Defined Networking (SDN) offers an abstract view of the network and assists network operators to control the network traffic and the associated network resources more effectively. For the past few years, SDN has shown a lot of merits in diverse fields of applications, an important one being the Wireless Body Area Network (WBAN) for healthcare services. With the amalgamation of SDN with WBAN (SDWBAN), the patient monitoring and management system has gained much more flexibility and scalability compared to the conventional WBAN.
View Article and Find Full Text PDFOver the last few decades, the proliferation of the Internet of Things (IoT) has produced an overwhelming flow of data and services, which has shifted the access control paradigm from a fixed desktop environment to dynamic cloud environments. Fog computing is associated with a new access control paradigm to reduce the overhead costs by moving the execution of application logic from the centre of the cloud data sources to the periphery of the IoT-oriented sensor networks. Indeed, accessing information and data resources from a variety of IoT sources has been plagued with inherent problems such as data heterogeneity, privacy, security and computational overheads.
View Article and Find Full Text PDFObjective: to assess the efficacy of vacuum therapy in mechanically straightening the penile curvature of Peyronie's disease (PD).
Patients And Methods: Modelling of the tunica albuginea has been shown to be possible during penile implant surgery and this principle has been applied as an alternative conservative therapy. In all, 31 patients with PD (mean duration 9.
Purpose: Strength athletes often employ the deadlift in their training or rehabilitation regimens. The purpose of this study was to compare muscle activity between sumo and conventional style deadlifts, and between belt and no-belt conditions.
Methods: Six cameras collected 60-Hz video data and 960-Hz electromyographic data from 13 collegiate football players who performed sumo and conventional deadlifts with and without a lifting belt, employing a 12-RM intensity.
Myofibromas are mesenchymal tumors that most often present in infancy. There are sporadic cases in adults throughout the literature. Myofibroma will demonstrate a variable appearance on CT and ultrasound, but tends to have a fairly consistent appearance on MR imaging.
View Article and Find Full Text PDFPurpose: Strength athletes often employ the deadlift in their training or rehabilitation regimens. The purpose of this study was to quantify kinematic and kinetic parameters by employing a three-dimensional analysis during sumo and conventional style deadlifts.
Methods: Two 60-Hz video cameras recorded 12 sumo and 12 conventional style lifters during a national powerlifting championship.