2018
DOI: 10.30880/ijie.2018.10.06.008
|View full text |Cite
|
Sign up to set email alerts
|

CAMP: Congestion Avoidance and Mitigation Protocol for Wireless Body Area Networks

Abstract: Word population of old age people is growing very fast. This is a leading threat to current health care systems which trends to lesser the health facilities in proportional to the population. As reported by US Bureau of Census, the number of aged population is expected to be twice in 2025 from 380 (in 1990) [1]. The aged people mostly fall to different chronic health issues which require steady healthcare. These people needs to stick with hospitals, if not, they may experience the life risk [2]. Researchers af… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
7
1

Relationship

2
6

Authors

Journals

citations
Cited by 18 publications
(10 citation statements)
references
References 17 publications
0
10
0
Order By: Relevance
“…Results show that the most important feature that can affect student educational data is assessment data like final exam and assignment marks are most important. Decision tree performs useful as using random forest achieving highest accuracy [23][24][25][26].…”
Section: Discussionmentioning
confidence: 99%
“…Results show that the most important feature that can affect student educational data is assessment data like final exam and assignment marks are most important. Decision tree performs useful as using random forest achieving highest accuracy [23][24][25][26].…”
Section: Discussionmentioning
confidence: 99%
“…The final block diagram of the induction motor drive is completed by integrating the subsystems in which the torque-current feedback loop and induced emf feedback loop are overlapped. Block-diagram reduction techniques are used to overcome this overlap in which the inner current loop is made independent of the motor mechanical transfer function, and this method offers a simpler construction of the current controller [29][30][31][32].…”
Section: Figurementioning
confidence: 99%
“…Users can also remove and delete online or cloud accounts and make a new one, with this act attackers will not be able to take more steps later. After following all these precautions users can prevent the chance of MITC attacks and can increase system or cloud security (Anwar et al, 2017; Anwar et al, 2018c).…”
Section: Types Of Phishing Attacksmentioning
confidence: 99%
“…This type of attack used either a fraudulent website or email. This type of attack happened when an attacker “spoofs” a company or organization domain to Change their emails which look like coming from the original or official domain. Design fake websites by adopting the real website design and using either Unicode which looks like ASCII code or an identical URL that looks similar to the official domain. All attacks mentioned above imposed an impact on a user in a way that he could not understand and become an easy target by phishers (Anwar et al, 2018c; Butt et al, 2018; Qureshi et al, 2016).…”
Section: Types Of Phishing Attacksmentioning
confidence: 99%