Search results
1 – 10 of 662Radha Subramanyam, Y. Adline Jancy and P. Nagabushanam
Cross-layer approach in media access control (MAC) layer will address interference and jamming problems. Hybrid distributed MAC can be used for simultaneous voice, data…
Abstract
Purpose
Cross-layer approach in media access control (MAC) layer will address interference and jamming problems. Hybrid distributed MAC can be used for simultaneous voice, data transmissions in wireless sensor network (WSN) and Internet of Things (IoT) applications. Choosing the correct objective function in Nash equilibrium for game theory will address fairness index and resource allocation to the nodes. Game theory optimization for distributed may increase the network performance. The purpose of this study is to survey the various operations that can be carried out using distributive and adaptive MAC protocol. Hill climbing distributed MAC does not need a central coordination system and location-based transmission with neighbor awareness reduces transmission power.
Design/methodology/approach
Distributed MAC in wireless networks is used to address the challenges like network lifetime, reduced energy consumption and for improving delay performance. In this paper, a survey is made on various cooperative communications in MAC protocols, optimization techniques used to improve MAC performance in various applications and mathematical approaches involved in game theory optimization for MAC protocol.
Findings
Spatial reuse of channel improved by 3%–29%, and multichannel improves throughput by 8% using distributed MAC protocol. Nash equilibrium is found to perform well, which focuses on energy utility in the network by individual players. Fuzzy logic improves channel selection by 17% and secondary users’ involvement by 8%. Cross-layer approach in MAC layer will address interference and jamming problems. Hybrid distributed MAC can be used for simultaneous voice, data transmissions in WSN and IoT applications. Cross-layer and cooperative communication give energy savings of 27% and reduces hop distance by 4.7%. Choosing the correct objective function in Nash equilibrium for game theory will address fairness index and resource allocation to the nodes.
Research limitations/implications
Other optimization techniques can be applied for WSN to analyze the performance.
Practical implications
Game theory optimization for distributed may increase the network performance. Optimal cuckoo search improves throughput by 90% and reduces delay by 91%. Stochastic approaches detect 80% attacks even in 90% malicious nodes.
Social implications
Channel allocations in centralized or static manner must be based on traffic demands whether dynamic traffic or fluctuated traffic. Usage of multimedia devices also increased which in turn increased the demand for high throughput. Cochannel interference keep on changing or mitigations occur which can be handled by proper resource allocations. Network survival is by efficient usage of valid patis in the network by avoiding transmission failures and time slots’ effective usage.
Originality/value
Literature survey is carried out to find the methods which give better performance.
Details
Keywords
Rabia H. Haddad, Bushra Kh. Alhusamiah, Razan H. Haddad, Mo’tasem M. Aldaieflih, Khalid Yaseen, Younis H. Abuhashish, Ayman M. Hamdan-Mansour and Jafar A. Alshraideh
This study aims to evaluate and summarize the effectiveness of cognitive behavioral therapy (CBT) and internet-based CBT (ICBT) interventions on relapse prevention and severity of…
Abstract
Purpose
This study aims to evaluate and summarize the effectiveness of cognitive behavioral therapy (CBT) and internet-based CBT (ICBT) interventions on relapse prevention and severity of symptoms among individuals with major depressive disorder (MDD). CBT is one of the most used and suggested interventions to manage MDD, whereas ICBT is a novel effective proposed approach.
Design/methodology/approach
The review was conducted following the preferred reporting items for systematic review and meta-analysis protocol. A comprehensive and extensive search was performed to identify and evaluate the relevant studies about the effectiveness of CBT and ICBT on relapse prevention and severity of symptoms among patients with MDD.
Findings
A total of eight research studies met the inclusion criteria and were included in this systematic review. RCT studies were conducted to assess and evaluate the effectiveness of CBT and ICBT on relapse prevention and severity of symptoms among patients with MDD. It has been found that CBT is a well-supported and evidently based effective psychotherapy for managing depressive symptoms and reducing the relapse and readmission rate among patients diagnosed with MDD. The ICBT demonstrated greater improvements in depressive symptoms during major depressive episodes among patients with MDDS. The ICBT program had good acceptability and satisfaction among participants in different countries.
Research limitations/implications
Despite the significant findings from this systematic review, certain limitations should be acknowledged. First, it is important to note that all the studies included in this review were exclusively conducted in the English language, potentially limiting the generalizability of the findings to non-English speaking populations. Second, the number of research studies incorporated in this systematic review was relatively limited, which may have resulted in a narrower scope of analysis. Finally, a few studies within the selected research had small sample sizes, which could potentially impact the precision and reliability of the overall conclusions drawn from this review. The authors recommend that nurses working in psychiatric units should use CBT interventions with patients with MDD.
Practical implications
This paper, a review of the literature gives an overview of CBT and ICBT interventions to reduce the severity of depressive symptoms and prevent patients’ relapse and rehospitalization and shows that CBT interventions are effective on relapse prevention among patients with MDD. In addition, there is still no standardized protocol to apply the CBT intervention in the scope of reducing the severity of depressive symptoms and preventing depression relapse among patients with major depressive disorder. Further research is needed to confirm the findings of this review. Future research is also needed to find out the most effective form and contents of CBT and ICBT interventions for MDD.
Social implications
CBT is a psychological intervention that has been recommended by the literature for the treatment of major depressive disorder (MDD). It is a widely recognized and accepted approach that combines cognitive and behavioral techniques to assist individuals overcome their depressive symptoms and improve their overall mental well-being. This would speculate that effectiveness associated with several aspects and combinations of different approaches in CBT interventions and the impact of different delivery models are essential for clinical practice and appropriate selection of the interventional combinations.
Originality/value
This systematic review focuses on the various studies that explore the effectiveness of face-to-face CBT and ICBT in reducing depressive symptoms among patients with major depressive disorder. These studies were conducted in different countries such as Iran, Australia, Pennsylvania and the USA.
Details
Keywords
Anna Young-Ferris, Arunima Malik, Victoria Calderbank and Jubin Jacob-John
Avoided emissions refer to greenhouse gas emission reductions that are a result of using a product or are emission removals due to a decision or an action. Although there is no…
Abstract
Purpose
Avoided emissions refer to greenhouse gas emission reductions that are a result of using a product or are emission removals due to a decision or an action. Although there is no uniform standard for calculating avoided emissions, market actors have started referring to avoided emissions as “Scope 4” emissions. By default, making a claim about Scope 4 emissions gives an appearance that this Scope of emissions is a natural extension of the existing and accepted Scope-based emissions accounting framework. The purpose of this study is to explore the implications of this assumed legitimacy.
Design/methodology/approach
Via a desktop review and interviews, we analyse extant Scope 4 company reporting, associated accounting methodologies and the practical implications of Scope 4 claims.
Findings
Upon examination of Scope 4 emissions and their relationship with Scopes 1, 2 and 3 emissions, we highlight a dynamic and interdependent relationship between quantification, commensuration and standardization in emissions accounting. We find that extant Scope 4 assessments do not fit the established framework for Scope-based emissions accounting. In line with literature on the territorializing nature of accounting, we call for caution about Scope 4 claims that are a distraction from the critical work of reducing absolute emissions.
Originality/value
We examine the implications of assumed alignment and borrowed legitimacy of Scope 4 with Scope-based accounting because Scope 4 is not an actual Scope, but a claim to a Scope. This is as an act of accounting territorialization.
Details
Keywords
In the final step, the trust model is applied to the on-demand federated multipath distance vector routing protocol (AOMDV) to introduce path trust as a foundation for routing…
Abstract
Purpose
In the final step, the trust model is applied to the on-demand federated multipath distance vector routing protocol (AOMDV) to introduce path trust as a foundation for routing selection in the route discovery phase, construct a trusted path, and implement a path warning mechanism to detect malicious nodes in the route maintenance phase, respectively.
Design/methodology/approach
A trust-based on-demand multipath distance vector routing protocol is being developed to address the problem of flying ad-hoc network being subjected to internal attacks and experiencing frequent connection interruptions. Following the construction of the node trust assessment model and the presentation of trust evaluation criteria, the data packet forwarding rate, trusted interaction degree and detection packet receipt rate are discussed. In the next step, the direct trust degree of the adaptive fuzzy trust aggregation network compute node is constructed. After then, rely on the indirect trust degree of neighbouring nodes to calculate the trust degree of the node in the network. Design a trust fluctuation penalty mechanism, as a second step, to defend against the switch attack in the trust model.
Findings
When compared to the lightweight trust-enhanced routing protocol (TEAOMDV), it significantly improves the data packet delivery rate and throughput of the network significantly.
Originality/value
Additionally, it reduces the amount of routing overhead and the average end-to-end delay.
Details
Keywords
Carlos Arturo Vallejo Hoyos and Flavia Braga Chinelato
This research delineates the interdependencies between e-service quality (e-SQ), product quality (PQ) and food biosafety measures (FBM) in shaping consumer satisfaction and…
Abstract
Purpose
This research delineates the interdependencies between e-service quality (e-SQ), product quality (PQ) and food biosafety measures (FBM) in shaping consumer satisfaction and loyalty within the online food delivery services (OFDS) landscape. Anchored by the technology acceptance model (TAM) and the theory of planned behavior (TPB), the study integrates these frameworks to examine how perceived service efficiency, reliability, product appeal and biosafety protocols contribute to overall consumer trust and repurchase intentions.
Design/methodology/approach
Surveys were conducted on several 100 online food delivery app users, ages 20 to 64, in major cities in Colombia, which provided data for structural equation modeling analysis.
Findings
The analysis revealed that reliable, responsive service and appealing food presentation significantly influence consumer perceptions of behind-the-scenes safety protocols during delivery. Strict standards around mitigating contamination risks and verifiable handling at each point further engender trust in the platform and intentions to repurchase among users. The data cement proper food security as pivotal for customer retention.
Practical implications
Quantitatively confirming biosafety’s rising centrality provides an impetus for platforms to integrate and promote integrity, safety and traceability protection as a competitive differentiator.
Originality/value
The study’s originality lies in its comprehensive exploration of the OFDS quality attributes and their direct impact on consumer loyalty. Besides, it offers valuable insights for both academic and practical implications in enhancing service delivery and marketing strategies.
Details
Keywords
Wesam Alyahya, Rayhana AlSharfa, Noor Alduhbaki, Batool Al-Zahir, Marwa Alqalaf, Jumanah Alawfi, Hussah Altwejri, Hanoof Alessa, Tunny Purayidathil and Rabie Khattab
The objective of this study was to delineate and compare enteral nutrition (EN) practices among neonatal units across the Arabian Gulf countries.
Abstract
Purpose
The objective of this study was to delineate and compare enteral nutrition (EN) practices among neonatal units across the Arabian Gulf countries.
Design/methodology/approach
A cross-sectional study was conducted by recruiting 255 clinicians working in neonatal units in the Arabian Gulf countries.
Findings
Out of 255 invited clinicians, 73 (29%) participated in the survey. Neonatal units used varied EN strategies, where feeding practices exhibited variability. The majority (74%) of units had a local standard feeding protocol, while 18% followed international protocols, and 8% did not adhere to a specific protocol. When maternal milk was not used, the main alternatives were preterm formula (67%) and predigested formula (14%). The age at which the first EN was commenced and the reported advancement rate showed significant variations among different units (p < 0.001). The initiation of fortification was primarily driven by reaching a specific enteral volume (commonly reported as 100 mL/kg/day) and addressing poor postnatal growth. Fortification practices did not differ significantly among professions, except for the initial fortification strength, where none of the dietitians and only 8.3% of neonatologists preferred full strength, compared to 28.6% and 21.4% of medical residents and nurses, respectively (p = 0.033).
Originality/value
This study marks the first exploration of EN practices in neonatal units, examining their local and cross-country variations. It provides valuable insights to guide local trials and foster global collaboration among neonatal units to establish a unified knowledge base, standardized practices and promote research and innovation, ultimately contributing to optimal feeding practices for very preterm infants.
Details
Keywords
Carlos González and Daniel Ponce
This paper aims first to describe the most prevalent teachers’ and students’ behaviors in synchronous online classes in emergency remote teaching; second, to discern behavior…
Abstract
Purpose
This paper aims first to describe the most prevalent teachers’ and students’ behaviors in synchronous online classes in emergency remote teaching; second, to discern behavior profiles and third, to investigate what features explain the observed behaviors.
Design/methodology/approach
An adapted COPUS observation protocol was employed to observe 292 online classes from 146 higher education teachers.
Findings
The most prevalent behaviors were: Presenting for teachers and Receiving for students, followed by Teachers Guiding and Students Talking to Class. Furthermore, cluster analysis showed two groups: Traditional and Interactive. The variables that better explained belonging to the Interactive lecture group were disciplinary area – social sciences and humanities –and teaching in technical institutions.
Practical implications
In a context where higher education institutions intend to project the lessons learned into post-pandemic learning experiences, this study provides observational evidence to realize the full potential expected from online and blended teaching and learning.
Originality/value
Despite the prevalence of synchronous online lectures during COVID-19, there is a paucity of observational studies on the actual behaviors that occurred in this context. Most research has been based on surveys and interviews. This study addresses this gap.
Details
Keywords
Mohammed-Alamine El Houssaini, Abdellah Nabou, Abdelali Hadir, Souad El Houssaini and Jamal El Kafi
Ad hoc mobile networks are commonplace in every aspect of our everyday life. They become essential in many industries and have uses in logistics, science and the military…
Abstract
Purpose
Ad hoc mobile networks are commonplace in every aspect of our everyday life. They become essential in many industries and have uses in logistics, science and the military. However, because they operate mostly in open spaces, they are exposed to a variety of dangers. The purpose of this study is to introduce a novel method for detecting the MAC layer misbehavior.
Design/methodology/approach
The proposed novel approach is based on exponential smoothing for throughput prediction to address this MAC layer misbehavior. The real and expected throughput are processed using an exponential smoothing algorithm to identify this attack, and if these metrics exhibit a trending pattern, an alarm is then sent.
Findings
The effect of the IEEE 802.11 MAC layer misbehavior on throughput was examined using the NS-2 network simulator, as well as the approval of our novel strategy. The authors have found that a smoothing factor value that is near to 0 provides a very accurate throughput forecast that takes into consideration the recent history of the updated values of the real value. As for the smoothing factor values that are near to 1, they are used to identify MAC layer misbehavior.
Originality/value
According to the authors’ modest knowledge, this new scheme has not been proposed in the state of the art for the detection of greedy behavior in mobile ad hoc networks.
Details
Keywords
Ishrat Ayub Sofi, Ajra Bhat and Rahat Gulzar
The study aims to shed light on the current state of “Dataset repositories” indexed in Directory of Open Access Repositories (OpenDOAR).
Abstract
Purpose
The study aims to shed light on the current state of “Dataset repositories” indexed in Directory of Open Access Repositories (OpenDOAR).
Design/methodology/approach
From each repository/record information, the Open-Access Policies, Open Archives Initiative Protocol for Metadata Harvesting (OAI-PMH), year of creation and the number of data sets archived in the repositories were manually searched, documented and analyzed.
Findings
Developed countries like the United Kingdom and the USA are primarily involved in the development of institutional open-access repositories comprising significant components of OpenDOAR. The most extensively used software is DSpace. Most data set archives are OAI-PMH compliant but do not follow open-access rules. The study also highlights the sites’ embrace of Web 2.0 capabilities and discovers really simple syndication feeds and Atom integration. The use of social media has made its presence known. Furthermore, the study concludes that the number of data sets kept in repositories is insufficient, although the expansion of such repositories has been consistent over the years.
Practical implications
The work has the potential to benefit both researchers in general and policymakers in particular. Scholars interested in research data, data sharing and data reuse can learn about the present state of repositories that preserve data sets in OpenDOAR. At the same time, policymakers can develop recommendations and policies to assist in the construction and maintenance of repositories for data sets.
Originality/value
According to the literature, there have been numerous studies on open-access repositories and OpenDOAR internationally, but no research has focused on repositories preserving content-type data sets. As a result, the study attempts to uncover various characteristics of OpenDOAR Data set repositories.
Details
Keywords
The main purpose of this paper was to evaluate the validation process of food safety control measures.
Abstract
Purpose
The main purpose of this paper was to evaluate the validation process of food safety control measures.
Design/methodology/approach
The validation of control measures has been analyzed at 50 food companies in Serbia. The sample included companies that produce food of both plant and animal origin and have certified food safety management systems. A total of 156 control measures that combat physical hazards (41.6%), followed by microbial hazards (34.0%) and chemical hazards (24.4%), have been analyzed. To enable quantification of the validation protocols, each control measure was assigned a score.
Findings
The validation scores showed that the highest level of validation was observed in large companies, as opposed to small and medium-sized companies (p < 0.05). The type of food safety hazards and the food sector did not reveal any statistical differences in-between the scores. The main approach to validating control measures was referring to the technical documentation of equipment used (52.6%), followed by scientific and legal requirements (30.7%). Less than 20% of the analyzed control measures were validated with operational data collected on-site. No mathematical modeling was observed for the sampled food companies. Future steps should include the development of validation guides for different types of control measures and training modules.
Practical implications
This study can serve as an improvement guide for food safety consultants, food safety auditors, certification bodies, inspection services, food technologists and food managers.
Originality/value
This study is one of the first to provide an insight into how food companies validate their control measures to combat microbial, chemical and physical food safety hazards.
Details