Search results

1 – 10 of 662
Article
Publication date: 11 October 2023

Radha Subramanyam, Y. Adline Jancy and P. Nagabushanam

Cross-layer approach in media access control (MAC) layer will address interference and jamming problems. Hybrid distributed MAC can be used for simultaneous voice, data…

Abstract

Purpose

Cross-layer approach in media access control (MAC) layer will address interference and jamming problems. Hybrid distributed MAC can be used for simultaneous voice, data transmissions in wireless sensor network (WSN) and Internet of Things (IoT) applications. Choosing the correct objective function in Nash equilibrium for game theory will address fairness index and resource allocation to the nodes. Game theory optimization for distributed may increase the network performance. The purpose of this study is to survey the various operations that can be carried out using distributive and adaptive MAC protocol. Hill climbing distributed MAC does not need a central coordination system and location-based transmission with neighbor awareness reduces transmission power.

Design/methodology/approach

Distributed MAC in wireless networks is used to address the challenges like network lifetime, reduced energy consumption and for improving delay performance. In this paper, a survey is made on various cooperative communications in MAC protocols, optimization techniques used to improve MAC performance in various applications and mathematical approaches involved in game theory optimization for MAC protocol.

Findings

Spatial reuse of channel improved by 3%–29%, and multichannel improves throughput by 8% using distributed MAC protocol. Nash equilibrium is found to perform well, which focuses on energy utility in the network by individual players. Fuzzy logic improves channel selection by 17% and secondary users’ involvement by 8%. Cross-layer approach in MAC layer will address interference and jamming problems. Hybrid distributed MAC can be used for simultaneous voice, data transmissions in WSN and IoT applications. Cross-layer and cooperative communication give energy savings of 27% and reduces hop distance by 4.7%. Choosing the correct objective function in Nash equilibrium for game theory will address fairness index and resource allocation to the nodes.

Research limitations/implications

Other optimization techniques can be applied for WSN to analyze the performance.

Practical implications

Game theory optimization for distributed may increase the network performance. Optimal cuckoo search improves throughput by 90% and reduces delay by 91%. Stochastic approaches detect 80% attacks even in 90% malicious nodes.

Social implications

Channel allocations in centralized or static manner must be based on traffic demands whether dynamic traffic or fluctuated traffic. Usage of multimedia devices also increased which in turn increased the demand for high throughput. Cochannel interference keep on changing or mitigations occur which can be handled by proper resource allocations. Network survival is by efficient usage of valid patis in the network by avoiding transmission failures and time slots’ effective usage.

Originality/value

Literature survey is carried out to find the methods which give better performance.

Details

International Journal of Pervasive Computing and Communications, vol. 20 no. 2
Type: Research Article
ISSN: 1742-7371

Keywords

Abstract

Purpose

This study aims to evaluate and summarize the effectiveness of cognitive behavioral therapy (CBT) and internet-based CBT (ICBT) interventions on relapse prevention and severity of symptoms among individuals with major depressive disorder (MDD). CBT is one of the most used and suggested interventions to manage MDD, whereas ICBT is a novel effective proposed approach.

Design/methodology/approach

The review was conducted following the preferred reporting items for systematic review and meta-analysis protocol. A comprehensive and extensive search was performed to identify and evaluate the relevant studies about the effectiveness of CBT and ICBT on relapse prevention and severity of symptoms among patients with MDD.

Findings

A total of eight research studies met the inclusion criteria and were included in this systematic review. RCT studies were conducted to assess and evaluate the effectiveness of CBT and ICBT on relapse prevention and severity of symptoms among patients with MDD. It has been found that CBT is a well-supported and evidently based effective psychotherapy for managing depressive symptoms and reducing the relapse and readmission rate among patients diagnosed with MDD. The ICBT demonstrated greater improvements in depressive symptoms during major depressive episodes among patients with MDDS. The ICBT program had good acceptability and satisfaction among participants in different countries.

Research limitations/implications

Despite the significant findings from this systematic review, certain limitations should be acknowledged. First, it is important to note that all the studies included in this review were exclusively conducted in the English language, potentially limiting the generalizability of the findings to non-English speaking populations. Second, the number of research studies incorporated in this systematic review was relatively limited, which may have resulted in a narrower scope of analysis. Finally, a few studies within the selected research had small sample sizes, which could potentially impact the precision and reliability of the overall conclusions drawn from this review. The authors recommend that nurses working in psychiatric units should use CBT interventions with patients with MDD.

Practical implications

This paper, a review of the literature gives an overview of CBT and ICBT interventions to reduce the severity of depressive symptoms and prevent patients’ relapse and rehospitalization and shows that CBT interventions are effective on relapse prevention among patients with MDD. In addition, there is still no standardized protocol to apply the CBT intervention in the scope of reducing the severity of depressive symptoms and preventing depression relapse among patients with major depressive disorder. Further research is needed to confirm the findings of this review. Future research is also needed to find out the most effective form and contents of CBT and ICBT interventions for MDD.

Social implications

CBT is a psychological intervention that has been recommended by the literature for the treatment of major depressive disorder (MDD). It is a widely recognized and accepted approach that combines cognitive and behavioral techniques to assist individuals overcome their depressive symptoms and improve their overall mental well-being. This would speculate that effectiveness associated with several aspects and combinations of different approaches in CBT interventions and the impact of different delivery models are essential for clinical practice and appropriate selection of the interventional combinations.

Originality/value

This systematic review focuses on the various studies that explore the effectiveness of face-to-face CBT and ICBT in reducing depressive symptoms among patients with major depressive disorder. These studies were conducted in different countries such as Iran, Australia, Pennsylvania and the USA.

Details

Mental Health and Social Inclusion, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2042-8308

Keywords

Article
Publication date: 28 March 2024

Anna Young-Ferris, Arunima Malik, Victoria Calderbank and Jubin Jacob-John

Avoided emissions refer to greenhouse gas emission reductions that are a result of using a product or are emission removals due to a decision or an action. Although there is no…

Abstract

Purpose

Avoided emissions refer to greenhouse gas emission reductions that are a result of using a product or are emission removals due to a decision or an action. Although there is no uniform standard for calculating avoided emissions, market actors have started referring to avoided emissions as “Scope 4” emissions. By default, making a claim about Scope 4 emissions gives an appearance that this Scope of emissions is a natural extension of the existing and accepted Scope-based emissions accounting framework. The purpose of this study is to explore the implications of this assumed legitimacy.

Design/methodology/approach

Via a desktop review and interviews, we analyse extant Scope 4 company reporting, associated accounting methodologies and the practical implications of Scope 4 claims.

Findings

Upon examination of Scope 4 emissions and their relationship with Scopes 1, 2 and 3 emissions, we highlight a dynamic and interdependent relationship between quantification, commensuration and standardization in emissions accounting. We find that extant Scope 4 assessments do not fit the established framework for Scope-based emissions accounting. In line with literature on the territorializing nature of accounting, we call for caution about Scope 4 claims that are a distraction from the critical work of reducing absolute emissions.

Originality/value

We examine the implications of assumed alignment and borrowed legitimacy of Scope 4 with Scope-based accounting because Scope 4 is not an actual Scope, but a claim to a Scope. This is as an act of accounting territorialization.

Details

Accounting, Auditing & Accountability Journal, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0951-3574

Keywords

Article
Publication date: 26 April 2022

Elham Kariri and Kusum Yadav

In the final step, the trust model is applied to the on-demand federated multipath distance vector routing protocol (AOMDV) to introduce path trust as a foundation for routing…

Abstract

Purpose

In the final step, the trust model is applied to the on-demand federated multipath distance vector routing protocol (AOMDV) to introduce path trust as a foundation for routing selection in the route discovery phase, construct a trusted path, and implement a path warning mechanism to detect malicious nodes in the route maintenance phase, respectively.

Design/methodology/approach

A trust-based on-demand multipath distance vector routing protocol is being developed to address the problem of flying ad-hoc network being subjected to internal attacks and experiencing frequent connection interruptions. Following the construction of the node trust assessment model and the presentation of trust evaluation criteria, the data packet forwarding rate, trusted interaction degree and detection packet receipt rate are discussed. In the next step, the direct trust degree of the adaptive fuzzy trust aggregation network compute node is constructed. After then, rely on the indirect trust degree of neighbouring nodes to calculate the trust degree of the node in the network. Design a trust fluctuation penalty mechanism, as a second step, to defend against the switch attack in the trust model.

Findings

When compared to the lightweight trust-enhanced routing protocol (TEAOMDV), it significantly improves the data packet delivery rate and throughput of the network significantly.

Originality/value

Additionally, it reduces the amount of routing overhead and the average end-to-end delay.

Details

International Journal of Pervasive Computing and Communications, vol. 20 no. 2
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 12 April 2024

Carlos Arturo Vallejo Hoyos and Flavia Braga Chinelato

This research delineates the interdependencies between e-service quality (e-SQ), product quality (PQ) and food biosafety measures (FBM) in shaping consumer satisfaction and…

Abstract

Purpose

This research delineates the interdependencies between e-service quality (e-SQ), product quality (PQ) and food biosafety measures (FBM) in shaping consumer satisfaction and loyalty within the online food delivery services (OFDS) landscape. Anchored by the technology acceptance model (TAM) and the theory of planned behavior (TPB), the study integrates these frameworks to examine how perceived service efficiency, reliability, product appeal and biosafety protocols contribute to overall consumer trust and repurchase intentions.

Design/methodology/approach

Surveys were conducted on several 100 online food delivery app users, ages 20 to 64, in major cities in Colombia, which provided data for structural equation modeling analysis.

Findings

The analysis revealed that reliable, responsive service and appealing food presentation significantly influence consumer perceptions of behind-the-scenes safety protocols during delivery. Strict standards around mitigating contamination risks and verifiable handling at each point further engender trust in the platform and intentions to repurchase among users. The data cement proper food security as pivotal for customer retention.

Practical implications

Quantitatively confirming biosafety’s rising centrality provides an impetus for platforms to integrate and promote integrity, safety and traceability protection as a competitive differentiator.

Originality/value

The study’s originality lies in its comprehensive exploration of the OFDS quality attributes and their direct impact on consumer loyalty. Besides, it offers valuable insights for both academic and practical implications in enhancing service delivery and marketing strategies.

Details

International Journal of Quality & Reliability Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0265-671X

Keywords

Article
Publication date: 19 April 2024

Wesam Alyahya, Rayhana AlSharfa, Noor Alduhbaki, Batool Al-Zahir, Marwa Alqalaf, Jumanah Alawfi, Hussah Altwejri, Hanoof Alessa, Tunny Purayidathil and Rabie Khattab

The objective of this study was to delineate and compare enteral nutrition (EN) practices among neonatal units across the Arabian Gulf countries.

Abstract

Purpose

The objective of this study was to delineate and compare enteral nutrition (EN) practices among neonatal units across the Arabian Gulf countries.

Design/methodology/approach

A cross-sectional study was conducted by recruiting 255 clinicians working in neonatal units in the Arabian Gulf countries.

Findings

Out of 255 invited clinicians, 73 (29%) participated in the survey. Neonatal units used varied EN strategies, where feeding practices exhibited variability. The majority (74%) of units had a local standard feeding protocol, while 18% followed international protocols, and 8% did not adhere to a specific protocol. When maternal milk was not used, the main alternatives were preterm formula (67%) and predigested formula (14%). The age at which the first EN was commenced and the reported advancement rate showed significant variations among different units (p < 0.001). The initiation of fortification was primarily driven by reaching a specific enteral volume (commonly reported as 100 mL/kg/day) and addressing poor postnatal growth. Fortification practices did not differ significantly among professions, except for the initial fortification strength, where none of the dietitians and only 8.3% of neonatologists preferred full strength, compared to 28.6% and 21.4% of medical residents and nurses, respectively (p = 0.033).

Originality/value

This study marks the first exploration of EN practices in neonatal units, examining their local and cross-country variations. It provides valuable insights to guide local trials and foster global collaboration among neonatal units to establish a unified knowledge base, standardized practices and promote research and innovation, ultimately contributing to optimal feeding practices for very preterm infants.

Details

Nutrition & Food Science , vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0034-6659

Keywords

Article
Publication date: 25 March 2024

Carlos González and Daniel Ponce

This paper aims first to describe the most prevalent teachers’ and students’ behaviors in synchronous online classes in emergency remote teaching; second, to discern behavior…

Abstract

Purpose

This paper aims first to describe the most prevalent teachers’ and students’ behaviors in synchronous online classes in emergency remote teaching; second, to discern behavior profiles and third, to investigate what features explain the observed behaviors.

Design/methodology/approach

An adapted COPUS observation protocol was employed to observe 292 online classes from 146 higher education teachers.

Findings

The most prevalent behaviors were: Presenting for teachers and Receiving for students, followed by Teachers Guiding and Students Talking to Class. Furthermore, cluster analysis showed two groups: Traditional and Interactive. The variables that better explained belonging to the Interactive lecture group were disciplinary area – social sciences and humanities –and teaching in technical institutions.

Practical implications

In a context where higher education institutions intend to project the lessons learned into post-pandemic learning experiences, this study provides observational evidence to realize the full potential expected from online and blended teaching and learning.

Originality/value

Despite the prevalence of synchronous online lectures during COVID-19, there is a paucity of observational studies on the actual behaviors that occurred in this context. Most research has been based on surveys and interviews. This study addresses this gap.

Details

Journal of Applied Research in Higher Education, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2050-7003

Keywords

Article
Publication date: 3 July 2023

Mohammed-Alamine El Houssaini, Abdellah Nabou, Abdelali Hadir, Souad El Houssaini and Jamal El Kafi

Ad hoc mobile networks are commonplace in every aspect of our everyday life. They become essential in many industries and have uses in logistics, science and the military…

Abstract

Purpose

Ad hoc mobile networks are commonplace in every aspect of our everyday life. They become essential in many industries and have uses in logistics, science and the military. However, because they operate mostly in open spaces, they are exposed to a variety of dangers. The purpose of this study is to introduce a novel method for detecting the MAC layer misbehavior.

Design/methodology/approach

The proposed novel approach is based on exponential smoothing for throughput prediction to address this MAC layer misbehavior. The real and expected throughput are processed using an exponential smoothing algorithm to identify this attack, and if these metrics exhibit a trending pattern, an alarm is then sent.

Findings

The effect of the IEEE 802.11 MAC layer misbehavior on throughput was examined using the NS-2 network simulator, as well as the approval of our novel strategy. The authors have found that a smoothing factor value that is near to 0 provides a very accurate throughput forecast that takes into consideration the recent history of the updated values of the real value. As for the smoothing factor values that are near to 1, they are used to identify MAC layer misbehavior.

Originality/value

According to the authors’ modest knowledge, this new scheme has not been proposed in the state of the art for the detection of greedy behavior in mobile ad hoc networks.

Details

International Journal of Pervasive Computing and Communications, vol. 20 no. 2
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 9 April 2024

Ishrat Ayub Sofi, Ajra Bhat and Rahat Gulzar

The study aims to shed light on the current state of “Dataset repositories” indexed in Directory of Open Access Repositories (OpenDOAR).

Abstract

Purpose

The study aims to shed light on the current state of “Dataset repositories” indexed in Directory of Open Access Repositories (OpenDOAR).

Design/methodology/approach

From each repository/record information, the Open-Access Policies, Open Archives Initiative Protocol for Metadata Harvesting (OAI-PMH), year of creation and the number of data sets archived in the repositories were manually searched, documented and analyzed.

Findings

Developed countries like the United Kingdom and the USA are primarily involved in the development of institutional open-access repositories comprising significant components of OpenDOAR. The most extensively used software is DSpace. Most data set archives are OAI-PMH compliant but do not follow open-access rules. The study also highlights the sites’ embrace of Web 2.0 capabilities and discovers really simple syndication feeds and Atom integration. The use of social media has made its presence known. Furthermore, the study concludes that the number of data sets kept in repositories is insufficient, although the expansion of such repositories has been consistent over the years.

Practical implications

The work has the potential to benefit both researchers in general and policymakers in particular. Scholars interested in research data, data sharing and data reuse can learn about the present state of repositories that preserve data sets in OpenDOAR. At the same time, policymakers can develop recommendations and policies to assist in the construction and maintenance of repositories for data sets.

Originality/value

According to the literature, there have been numerous studies on open-access repositories and OpenDOAR internationally, but no research has focused on repositories preserving content-type data sets. As a result, the study attempts to uncover various characteristics of OpenDOAR Data set repositories.

Details

Digital Library Perspectives, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2059-5816

Keywords

Article
Publication date: 27 March 2024

Ilija Djekic and Nada Smigic

The main purpose of this paper was to evaluate the validation process of food safety control measures.

Abstract

Purpose

The main purpose of this paper was to evaluate the validation process of food safety control measures.

Design/methodology/approach

The validation of control measures has been analyzed at 50 food companies in Serbia. The sample included companies that produce food of both plant and animal origin and have certified food safety management systems. A total of 156 control measures that combat physical hazards (41.6%), followed by microbial hazards (34.0%) and chemical hazards (24.4%), have been analyzed. To enable quantification of the validation protocols, each control measure was assigned a score.

Findings

The validation scores showed that the highest level of validation was observed in large companies, as opposed to small and medium-sized companies (p < 0.05). The type of food safety hazards and the food sector did not reveal any statistical differences in-between the scores. The main approach to validating control measures was referring to the technical documentation of equipment used (52.6%), followed by scientific and legal requirements (30.7%). Less than 20% of the analyzed control measures were validated with operational data collected on-site. No mathematical modeling was observed for the sampled food companies. Future steps should include the development of validation guides for different types of control measures and training modules.

Practical implications

This study can serve as an improvement guide for food safety consultants, food safety auditors, certification bodies, inspection services, food technologists and food managers.

Originality/value

This study is one of the first to provide an insight into how food companies validate their control measures to combat microbial, chemical and physical food safety hazards.

Details

British Food Journal, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0007-070X

Keywords

1 – 10 of 662