Due to tremendous use of smartphones the concern of cloud computing in mobile devices emerges, which is known as Mobile Cloud Computing (MCC). It involves the usage of mobile devices and cloud computing to perform resource intensive tasks using the internet with minimum impact on cellular resources. Nowadays, people are relying on mobile devices due to their small size and user friendly interface but due to its limited storage capacity, people can no more rely on internal RAM. Therefore, this promotes a drastic need for technology to make it possible for anyone to access their data anywhere anytime. As a result, Mobile Cloud Computing facilitates mobile users with its enticing technology by providing its on-demand and scalable services. But privacy and security are the main concern for a mobile user in the modern era. Thus, issues regarding security can be divided into cloud security and mobile network user's security, respectively. However, the primary focus of this study is to analyze how to secure the user's data in a mobile cloud. Leading to objectives, the current study presents a comprehensive analysis of existing techniques that can be considered for securing data in MCC efficiently. Moreover, this work will contribute a state-of-the-art roadmap to research and development communities for the right selection of proposed approach.
Location-Based Services (LBS) System is rapidly growing due to radio communication services with wireless mobile devices having a positioning component in it. LBS System offers location-based services by knowing the actual user position. A mobile user uses LBS to access services relevant to their locations. In order to provide Point of Interest (POI), LBS confronts numerous privacy related challenges in three different formats including Non-Trusted Third Party (NTTP), Trusted Third Party (TTP), and Mobile Peer-to-Peer (P2P). The current study emphasized the TTP based LBS system where the Location server does not provide full privacy to mobile users. In TTP based LBS system, a user's privacy is concerned with personal identity, location information, and time information. In order to accomplish privacy under these concerns, state-of-the-art existing mechanisms have been reviewed. Hence, the aim to provide a promising roadmap to research and development communities for the right selection of privacy approach has achieved by conducting a comparative survey of the TTP based approaches. Leading to these privacy attributes, the current study addressed the privacy challenge by proposing a new privacy protection model named "Improved Dummy Position" (IDP) that protects TIP (Time, Identity, and Position) attributes under TTP LBS System. In order to validate the privacy level, a comparative analysis has been conducted by implementing the proposed IDP model in the simulation tool, Riverbed Modeler academic edition. The different scenarios of changing query transferring rate evaluate the performance of the proposed model. Simulation results demonstrate that our IDP could be considered as a promising model to protect user's TIP attributes in a TTP based LBS system due to better performance and improved privacy level. Further, the proposed model extensively compared with the existing work.
Background: Due to cartilage damage adduction movement increased at knee joint which alters biomechanics of knee joint. All muscles attached to knee joint get overstretched, tightened and trigger points formed in them produces pain and alters functioning of knee joint. Objective: To determine which treatment approach either integrated neuromuscular inhibition technique INIT combined with conventional treatment or conventional treatment alone was effective in reducing pain, improving ROM and quality of life in patients with knee osteoarthritis. Material and Methodology: A randomized clinical trial was conducted on n=28 patients (23 females, 5 males) with age group of 45-70 years were randomly allocated into 2 groups. Group A received conventional treatment along with INIT technique and group B received conventional treatment alone, treatment was given for 2 weeks with 3 sessions / week. NPRS was used to measure pain at baseline, after 1st, 2nd, 4th and 6th session of treatment. ROM through goniometer measured at baseline, after 1st and at end of 2nd week (6th session). WOMAC scale for quality of life improvement measured at baseline and at end of 2nd week (6th session). SPSS version 20 was used for data analysis. Results: In-Between group analysis showed significant difference exist in knee pain and WOMAC scale values. However no, significant difference exist between both groups for knee flexion and extension except for knee extension range, improved after 6th session. Conclusion: Reduction in knee pain and disability of patient along with improved knee ROM was remarkably noted in the patients who received INIT technique combined with conventional treatment. Keywords: Osteoarthritis, trigger points, INIT technique, conventional treatment, Integrated Neuromuscular Inhibition Technique Ethical Approval Number: TUF/IRB/178/2023
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2025 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.