A visualization review analysis of the last two decades for Environmental Kuznets Curve "EKC" based on co-citation analysis theory and pathfinder network scaling algorithms
Pakistan is a developing country that is experiencing a shortage of electricity generation due to its rapidly growing demand. The existing and upcoming energy requirements for power generation and future transportation can be met by efficient utilisation of homegrown biomass resources. Determining the present energy mix resources in various sectors of the country is important. This article analyses the biomass resources and their potential and bioenergy utilisation in Pakistan. An overview of the global renewable energy scenario is presented. This article accentuates the importance and challenges of new technologies and estimates the current and future share of power generation from renewable sources, focusing on the technical potential of biomass energy, which is obtained from agricultural residues, animal manure and municipal solid wastes in Pakistan. This paper highlights the developing technologies that are primarily used to convert biomass waste into energy and presents a critical consideration on future directions in drafting the bioenergy framework policy in Pakistan. For effective implementation of biomass-based renewable energy production in the country, this paper presents an extensive literature review on current and future perspectives and suggestions on future directions and policies to overcome the deficit in electricity supply and environmental concerns. Furthermore, this paper discusses the utilisation of biomass resources in the rapidly growing transportation sector and presents a solution for upcoming mass transit projects in two major cities in Pakistan. The conclusion is that biomass energy is the most sustainable, eco-friendly and efficient renewable energy and is an emerging renewable energy resource that can meet the growing energy demand in Pakistan.
Device-to-Device (D2D) is a major part of 5G that will facilitate deployments with extended coverage where devices can act as users or relays. These relays normally act as decode and forward relays (semi-intelligent devices) with limited computational and storage capabilities. However, introducing such a technology, where users can act as relays, presents a wide range of security threats, in particular, rogue relay devices or man in the middle attacks (M-I-T-M). Second, passing fewer control messages is always advisable when considering authenticity and secrecy. To mitigate M-I-T-M and to reduce communication costs, this paper presents a lightweight elliptic-ElGamal-based authentication scheme using PKI (FHEEP) in D2D communication. Pollard’s rho and Baby Step, Giant Step (BSGS) methods are used to evaluate the authenticity and secrecy of our proposed scheme. The communication cost is calculated based on the comparative analysis indicating that our proposed scheme outperforms the baseline protocol. The proposed scheme can be used for any infrastructure architecture that will enhance the security of any D2D settings with better performance.
Mobile ad hoc networks are the “spontaneous networks” which create a temporary network in any place and any time without using any extra fixed radio device of a full infrastructure network. Each device in this network works as a router to develop end-to-end communication connections and move independently in any direction. Mostly, mobile ad hoc networks use the IEEE 802.11b protocol with carrier-sense multiple access with collision avoidance medium access control layer protocol for sharing a common medium among the nodes simultaneously. Due to this distributed medium, the routing and medium access control layer of the mobile ad hoc network are prone to attacks. Among several attackers, blackhole attacker is the dangerous one which causes the loss of all data packets of devices in the network. Efficient medium access control protocol designs in this respect play a key role in determining channel utilization, network delay, and, more importantly, network security. In the proposed work, preamble information is used with time-division multiple access medium access control. The preamble time-division multiple access uses time synchronization for each time slot and does not assign much time to the blackhole attacker due to a fixed time slot. As a result, blackhole is not stable in all communications and such an attack is effectively defended. Simulation results show that, in the presence of the blackhole attacker, carrier-sense multiple access with collision avoidance has a high packet loss ratio and low network throughput as compared to the proposed preamble time-division multiple access.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.