Method: This study was conducted according to Arksey and O'Malley's framework. To investigate the evidence on the effects of Kinect-based rehabilitation, a search was executed in five databases (Web of Science, PubMed, Cochrane Library, Scopus, and IEEE) from 2010 to 2020.
Results: Thirty-three articles were finally selected by the inclusion criteria.
Introduction And Aim: Multiple Sclerosis (MS) is a disease determined by inflammatory demyelination and neurodegeneration in the Central Nervous System (CNS). Despite the extensive utilization of Complementary and Alternative Medicine (CAM) in MS, there is a need to have comprehensive evidence regarding their application in the management of MS symptoms. This manuscript is a Systematic Literature Review and classification (SLR) of CAM therapies for the management of MS symptoms based on the International Classification of Functioning Disability and Health (ICF) model.
View Article and Find Full Text PDFIn many countries, the Internet of Medical Things (IoMT) has been deployed in tandem with other strategies to curb the spread of COVID-19, improve the safety of front-line personnel, increase efficacy by lessening the severity of the disease on human lives, and decrease mortality rates. Significant inroads have been achieved in terms of applications and technology, as well as security which have also been magnified through the rapid and widespread adoption of IoMT across the globe. A number of on-going researches show the adoption of secure IoMT applications is possible by incorporating security measures with the technology.
View Article and Find Full Text PDFProxy Mobile IPv6 is a network-based localized mobility management protocol that supports mobility without mobile nodes' participation in mobility signaling. The details of user authentication procedure are not specified in this standard, hence, many authentication schemes have been proposed for this standard. In 2013, Chuang et al.
View Article and Find Full Text PDFCloud computing is a new generation of technology which is designed to provide the commercial necessities, solve the IT management issues, and run the appropriate applications. Another entry on the list of cloud functions which has been handled internally is Identity Access Management (IAM). Companies encounter IAM as security challenges while adopting more technologies became apparent.
View Article and Find Full Text PDF