International Journal of Wireless and Ad Hoc Communication

Journal DOI

https://doi.org/10.54216/IJWAC

Submit Your Paper

2692-4056ISSN (Online)

An Overview of Cloud-Based Secure Services for Enterprise Drug–Drug Interaction Systems

Muhammad Edmerdash, Waleed khedr, Ehab Rushdy

Cloud computing has brought a new paradigm shift to the technology industry and has become increasingly popular. Cloud communication is an emerging technology that can be combined with traditional healthcare management used to provide better healthcare services. Today, the adoption rate of cloud computing by small and medium enterprises (SMEs) is much higher than that of large companies. This triggered a debate about whether this cloud computing technology will penetrate the entire IT industry. Small and midsize enterprises are using cloud computing to deploy general IT infrastructure and software systems at low-cost, while large enterprises rely on their own infrastructure to ensure data security, privacy, and flexibility. One of the most demanded healthcare services that needs the cloud privileges is Drug-Drug Interaction – DDI. In this article, we have investigated different traditional systems compared to cloud-based systems, and as a privilege of providing system solutions to the public, what features the cloud brings to improve health management software.

Read More

Doi: https://doi.org/10.54216/IJWAC.020201

Vol. Volume 2 Issue. Issue 2 PP. 49-58, (2021)

Improvement and Enhancement of bandwidth of 5G Networks using Machine Learning

Aaras Y.kraidi , A. Rajalingam

Radio-frequency-based systems are exhibiting severe bandwidth congestion as a result of the exponential development in the amount of data flow. Both cognitive radio technology and free-space-optical communication are examples of attempts to find solutions to the problems posed by high data rates and limited spectral bandwidth. Operating an optical wireless transmission system does not need the purchase of a license. Additionally, the accommodation of unlicensed users across the restricted frequency that is accessible to us is the foundation of the technology known as cognitive radio. Since Dynamic-Window Size systems do not need a license, they are very cost-effective, they can be readily deployed, and they provide a high bandwidth; hence, Dynamic-Window Size systems may be used to bridge with the existing Radio Frequency system. Within the framework of the proposed Dynamic-Window-Size system, the Radio Frequency link is modeled based on the Rayleigh distribution, whilst the Dynamic-Window-Size link experiences -/IG composite fading. It is possible to determine both the moment-generating function (MGF) and its derivative. By making use of the formulas that were derived from them, various performance metrics, such as ergodic channel capacity, bit error rate (BER), and output power are calculated, along with the validations that are provided by asymptotic findings. In addition to this, a new closed-form identity is discovered that relates to a specific instance of Bessel's function. In addition to the convex optimization that was mentioned above for the purpose of optimizing the overlay and underlay power in the scheme that was presented, the performance of the Cognitive Radio network is evaluated by making use of a variety of pulse-shaping windows. Suppressing the side lobes of the primary users' (PUs') sub-carriers is a way to reduce the amount of interference that primary users cause for secondary users without harming the primary users' own transmissions. This study involves the creation of a variety of pulse-shaping windows across a variety of power allocation systems as well as an examination of how these windows compare to one another.

Read More

Doi: https://doi.org/10.54216/IJWAC.020205

Vol. Volume 2 Issue. Issue 2 PP. 68-76, (2021)

A Survey on IoT based Wearable Sensor for Covid-19 Pandemic

Noushini Nikeetha P. , Pavithra D. , Sivakarthiga K. , Karthika S. , Yashitha R. , Kirubasri G.V.

The COVID-19 pandemics have highlighted the importance of leveraging and harnessing our digital infrastructure enabling remote health monitoring. We foresee the need for more powerful diseases diagnosis and monitoring of personal and group health, which might be supported by wearable sensors, since conventional virus testing and vaccinations are delayed. Also, Internet of Things (IoT) has gained traction in a variety of research sectors, including academic and industrial settings, particularly in healthcare. By merging economic, social, and technological perspectives, IoT revolution reshapes today's healthcare systems. It evolves from traditional medical services to far more individualised programs that allow patient monitoring, diagnosis & treatment more convenient. IoT with wearable has recognized as a dominant component of healthcare transformation. When commonly diagnosed, wearable devices are linked to the internet, it may acquire vital information that might save lives. Also, models designed regulates and continuously monitors the condition of the patient by employing an network infrastructure during pandemics, reducing stress of health care providers, minimising medical errors, decrease the amount of work and medical staff productivity, lowering on-going medical cost and improving patient experience. Developing a convenient and accurate wearable device for earlier detection, assessment during social distance, as well as recovery is important during COVID-19 outbreak. As a result, numerous researchers devised wearable models; this study looks at the effect of wearable body sensors based on IoT technology in fighting COVID-19. In addition, the advantages of wearable devices are contrasted to those of traditional approaches.

Read More

Doi: https://doi.org/10.54216/IJWAC.020203

Vol. Volume 2 Issue. Issue 2 PP. 77-87, (2021)

Design of the LAN Network of Hospital Comandante Manuel Piti Fajardo

Yunet Gasca Suárez , Omar Mar Cornelio

The design of the network of a health institution is a complicated task due to all the aspects that it encompasses, to satisfy the consumption needs of digitized services, using minimal time and at the lowest possible cost. The Manuel Piti Fajardo Hospital, according to the scope of health services it provides, has a system for Hospital Management, the Galen Clinica. This system requires a well-structured network design, with the appropriate equipment that responds quickly and efficiently to the traffic generated in the network. In line with this objective, a cost-benefit study was carried out, after applying the LAN design methodology and calculating approximately the traffic generated on the network in the main departments of the hospital, whether it be the Matrix or the Unit. Surgical and Imaging. With this, the result was to locate the network backbone, and determine the network components that should be replaced according to the financial budget of the hospital, a better response to the requests made by users and according to the evolution of technologies. of information and communications.

Read More

Doi: https://doi.org/10.54216/IJWAC.020204

Vol. Volume 2 Issue. Issue 2 PP. 88-98, (2021)

Reliable Data Communication Model for Fog Computing

Reem Atassi , Aditi Sharma

To maintain data privacy and control who has access to what in the cloud, attribute-based encryption might be utilized. Attribute security is violated when apparent qualities are introduced to the encrypted message to assist people to identify necessary details in vast systems. To offer an effective attribute-based access control with an authorized search strategy, this research expands the anonymous key-policy attribute-based encryption (AKP-ABE) to provide fine-grained data retrieval while safeguarding attribute privacy (EACAS). In EACAS, data users may generate the trapdoor using the secret key supplied by data owners and conduct searches based on access restrictions to get the relevant data. Cryptographic protocols and trapdoor generation use a synthetic property devoid of syntactic significance to provide an attribute-based search on the exported encoded information in the fog. Data owners may implement granular access control on their outsourced data by establishing the search criteria that will be used by data consumers to locate relevant content based on protected attributes. We show that compared to the state-of-the-art methods, EACAS requires less time and space to process and store data. 

Read More

Doi: https://doi.org/10.54216/IJWAC.020202

Vol. Volume 2 Issue. Issue 2 PP. 59-67, (2021)