American Journal of Bioinformatics Research

p-ISSN: 2167-6992    e-ISSN: 2167-6976

2021;  11(1): 1-31

doi:10.5923/j.bioinformatics.20211101.01

Received: Jan. 16, 2021; Accepted: Feb. 20, 2021; Published: Mar. 3, 2021

 

Effect of Coronavirus Worldwide through Misusing of Wireless Sensor Networks

Md. Rahimullah Miah1, AAM Shazzadur Rahman2, Md. Shahariar Khan3, Mohammad Abdul Hannan4, Md. Sabbir Hossain5, Chowdhury Shadman Shahriar6, S. A. M. Imran Hossain7, Mohammad Taimur Hossain Talukdar8, Alamgir Adil Samdany9, Mohammad Shamsul Alam10, Mohammad Basir Uddin11, Alexander Kiew Sayok12, Shahriar Hussain Chowdhury13

1Department of Information Technology in Health and Research Associate, Northeast Medical Pvt. Limited, Sylhet, Bangladesh and Former PhD Student, IBEC, Universiti Malaysia Sarawak (UNIMAS), Kota Samarahan, Sarawak, Malaysia

2Department of Medicine, Northeast Medical College, Sylhet, Bangladesh

3Department of Paediatrics, Northeast Medical College & Hospital, Sylhet, Bangladesh

4Department of Endocrinology, Northeast Medical College & Hospital, Sylhet, Bangladesh

5Department of Pathology, North East Medical College and Hospital, Sylhet, Bangladesh

6USMLE Student, USA and Ex-student of North East Medical College, Sylhet, Bangladesh

7Department of Oral and Maxillofacial Surgery, North East Medical College and Hospital, Sylhet

8Department of Clinical Oncology, North East Medical College and Hospital, Sylhet, Bangladesh

9Department of Orthopedics, Northeast Medical College, Sylhet, Bangladesh

10Department of Forensic Medicine, Northeast Medical College and Hospital, Sylhet

11Department of Paediatrics, Northeast Medical College and Hospital, Sylhet, Bangladesh

12IBEC, Universiti Malaysia Sarawak, Kota Samarahan, Sarawak, Malaysia

13Department of Dermatology, Northeast Medical College, Sylhet, Bangladesh

Correspondence to: Md. Rahimullah Miah, Department of Information Technology in Health and Research Associate, Northeast Medical Pvt. Limited, Sylhet, Bangladesh and Former PhD Student, IBEC, Universiti Malaysia Sarawak (UNIMAS), Kota Samarahan, Sarawak, Malaysia.

Email:

Copyright © 2021 The Author(s). Published by Scientific & Academic Publishing.

This work is licensed under the Creative Commons Attribution International License (CC BY).
http://creativecommons.org/licenses/by/4.0/

Abstract

Corona is a non-communicable sensor disease spreading worldwide through misusing of processed radio frequency. So far higher authorities of health services are facing the undesirable escalating causes of coronavirus towards human beings as a very scientific puzzle comprehensive issue. The study aims to evaluate the maltreating of wireless sensor networks that affect individuals within the body boundary area. Wireless sensor data were collected from individual’s profile, diagnosis and sensor node records at laboratory experiments. The study shows the effect of processed sensor nodes among individual’s body organs to compare with the existing environments. The study illustrates all individuals suffer from sensor disease due to reflecting of wavered sensors at open eyes sights with high speed electromagnetic-radio tracking systems. The overweight and obesity patients are sick from corona disease at less sensor time in a dark environment than that of light conditions. These findings replicate the severe global one health security that the expert provides in active eyes within geographic locations. Systematic healthcare awareness is essential for treatment with medical technological devices but such consciousness is poorly recognized and medication supports are still below par. The study suggests upcoming healthcare paths of a new dynamic alternative approach to promote global public health security concerning Sensor Health Policy and Sustainable Development Goals 2030.

Keywords: Corona virus, Sensor node, Obese, Dark environment, Health security

Cite this paper: Md. Rahimullah Miah, AAM Shazzadur Rahman, Md. Shahariar Khan, Mohammad Abdul Hannan, Md. Sabbir Hossain, Chowdhury Shadman Shahriar, S. A. M. Imran Hossain, Mohammad Taimur Hossain Talukdar, Alamgir Adil Samdany, Mohammad Shamsul Alam, Mohammad Basir Uddin, Alexander Kiew Sayok, Shahriar Hussain Chowdhury, Effect of Coronavirus Worldwide through Misusing of Wireless Sensor Networks, American Journal of Bioinformatics Research, Vol. 11 No. 1, 2021, pp. 1-31. doi: 10.5923/j.bioinformatics.20211101.01.

Article Outline

1. Introduction
    1.1. Historical Background of Coronavirus
2. Research Materials and Methods
    2.1. Study Site
    2.2. Sample Size and Study Design
    2.3. ISNAH Experiment
    2.4. Study Process
    2.5. Sensor Disease Spreading Process
    2.6. CASID Recovery Process
    2.7. Ethical Consideration
    2.8. Data Compilation
    2.9. Data Analysis and Interpretation
3. Results
    3.1. Identified of Individuals’ Location and Tracking Time
    3.2. Sensor Reflection at Dark Environment
    3.3. Impact of Processed Radio Frequency at Light Condition
    3.4. Integrated Impact of Sensor Networks
    3.5. BMI and Processed Radio Frequency
    3.6. Occurrence of Coronavirus Infection with Sensors
    3.7. Coronavirus Disease Spread through Wireless Sensor Technology
    3.8. Body Attack with Processed Wireless Sensor Technology
    3.9. Coronavirus Recovery Rate
    3.10. Case Study on Patients with Corona
    3.11. ISNAH Effect on Living Cells
4. Discussion
    4.1. Corona as a Sensor Technological Virus
    4.2. Who is Creating the Corona Virus?
    4.3. How to Detect Cyber Hackers
    4.4. Treatment
    4.5. COVID Care Pathway
    4.6. Global Corona Disease Recovery Systems
    4.7. Sensor Disease Management
    4.8. Global Uniqueness Research
    4.9. Worldwide Potentiality
    4.10. Safety Geo-health-politics
    4.11. Message of Sensor Technological War
    4.12. Looking Ahead Research
    4.13. Risks in Research
    4.14. Recommendations
5. Conclusions
6. Declarations
ACKNOWLEDGEMENTS
Appendix A: (i) False Interface and Voice Coding
Appendix B: Bouncing Message
Appendix C: CASID

1. Introduction

Coronavirus is the most pressing scientific puzzle, which is tarnished in the history of the world [1,2,3,4,5]. The virus infected several people at Wuhan Province in China on December 29, 2019 [6]. Then the number of people infected with the virus increased day by day and spread all over the world, and almost 2 million deaths from the COVID-19 virus [7,85]. This new virus and disease were unknown before the outbreak began at Wuhan last year but till to date total confirmed total cases 92022539, total deaths 1970394 (3%) and recovered 65865510 (97%) [8]. In this unwanted situation, all the countries and the whole world are worried, anxious and scared. There is stagnation in all spheres including social, economic and communication due to unwanted conditions of coronavirus [9]. The World Health Organization provides information and guidance online on the spread of the virus, as well as regular virtual conferences, meetings, press briefings and exchange of information [7]. Corona virus is known as COVID-19 or Coronavirus disease 2019, which is spreading in geographic locations, which is affecting 219 countries and territories around the world [8]. The most recently discovered coronavirus causes a disease formed COVID-19 [10]. Most countries in the world are inclined to such outbreaks due to the presence of interconnected markets, complex emergencies, barrier to religious mass gatherings, variation in emergency healthcare systems performance within and between geographic landscape, seascape and skyscape [11,12,13].
Now a day’s medical sensor technology is essential in every step of healthcare. Wireless Sensor Network is an integrated infrastructure comprising sensing, computing, detecting, tracking, observing and reacting the individuals within geographic positioning systems (GPS) locations [14]. This network deploys the indoor and outdoors in large sensor fields using the object's light and radio signal [13,15,16,17,18,19,20,21,22,23]. Current and customary medical systems cannot meet the requirements of patient needs in a timely fashion. Applications of sensor technology have unlocked up new scenarios in healthcare systems [24]. This technology is actually valuable in some healthcare applications, which can be inserted into the human body for treatment services [25,26,27]. The cutting-edge sensor technology misuses in different services including healthcare activities, which have triggered a collective capacity of scarcities and securities. Wireless sensor networks are premeditated to achieve the scarcities like dimension, tracking, detection and cataloging, simulation particularly the field of health monitoring [14]. A harmonized amount of medical technologies has been organized for patients’ monitoring who suffer from severe diseases or have urgent prerequisites [27]. Wearable health-monitoring provides a revolutionary sensor technology, which serves as an alternative to traditional diagnosis, putting healthcare data on a path that is more remote, portable, and timely [28,29,30,31]. Physicians and health researchers use these healthcare data to evaluate body conditions with a sensor technology like internet of everything, artificial intelligence, deep-learning algorithm [32,33,34]. Moreover, sensor technology has a great advantage on non-communicable diseases to identify the classical symptoms [14]. Wireless sensor networks are a huge endeavor of digital health technology, including technology dependence, which has led to frustration due to lack of proper security. Smartphones can do a lot of lucrative things with at least 12 functions with digital health sensor systems [35,36]. Cyber hackers misuse the radio frequency through smartphones, telematics and high frequency sensor devices for spreading this corona remote sensing VIRUS (Vital Information Resource Under Siege) among animals and human beings, mostly coronavirus [15]. Wireless sensor networks are a huge endeavor of digital healthcare including digital health data, technology dependence, which has led to frustration due to misusing of advanced technology [14]. The rationalized generations involve in good or harm activities to any human in the world through wireless sensor networks through hidden codes [14]. The present world is being one-sidedly mistreated sensor networks one after another from cyber hackers [15]. The heartbreaking phenomena of this frustration are the foremost consequence of today’s COVID-19 outbreaks in human beings [37].
The study is to observe the impact of wireless sensor networks towards individuals through spreading corona disease at body boundary. The aim of the study is to find out the new innovations with interdisciplinary approaches to solve the core challenges in global health security to recover corona disease in order to provide the justifiable policy options by the use of sensor technology.

1.1. Historical Background of Coronavirus

The history of coronavirus is long. Most people do not know its exact history, although some speak of China's Wuhan Province to infect people with novel coronavirus [95,96]. World Health Organization (WHO) leading Scientists searching the historical background of the coronavirus are wrapping up a protracted investigation in Wuhan, China [97,98,99]. Again, someone is saying "zoonotic cause" [100]. Different individuals and organizations have pointed out its wrong source in different ways. No one was fully aware of its exact source. Again, many are saying out of superstition and bigotry that corona is "the wrath or torment of Allah (SWT)." It is informed from my research that their ideas are wrong. Corona virus is not a wrath of God (Allah). Its man-made sensor programming virus, which can make people and animals sick by tracking them at specific GPS distances by adjusting the retina of human and animal eyes through sensor devices. This was revealed in 2018 through the ISNAH test in PhD research at UNIMAS (Universiti Malaysia Sarawak) in Malaysia. The PhD thesis was approved by the Senate of UNIMAS on May 20, 2018. Since then, the study has been trying to inform the people of the world about the findings of the PhD research from 2018 to date, but cyber hackers are creating obstacles in various ways. This is because, “some people (through the misuse of technology) are wreaking havoc on water and land all over the world” [87]. In 2018, the name of the study on sensor technology test was "ISNA-Impact of Sensor Networks towards Animals", and in 2019 it was called "Corona" at Wuhan, then WHO declared as COVID-19. The symptoms that appeared during research on dogs and cats are exactly the same in people infected with the coronavirus. Some scientists and researchers around the world have misunderstood the history of the coronavirus, which has already infected 105 million people and killed 2.3 million of them [85]. Again, many more are getting sick, some of them may die or be healed by being aware of its effects. Many in the world have tried to know its history, but many have failed, many have fallen ill and eventually died. It is an education for all of us, so that it can be realized the misusing of sensor networks in the future. Many have read my research and learned its basic history. In order to stay healthy, the study has presented the findings in various ways in the media, webinars, seminars, conferences and publications to create awareness. But some of them did not listen to me but called me a crazy-goat, also called me a liar, separated me from my family, fired me and many more tragic things happened - because of my research. So, corona is not spread by bats, humans or any other animals, it was not made in any scientific lab like the Wuhan Institute of Virology [101], but cyber hackers spread corona disease in humans and animals’ body through cloud sensing devices due to misusing of wireless sensor networks at certain GPS distances [15]. Mask, handwash, social and physical distance and vaccines are not completely recovery pathways, but cyber hackers send messages with false interfacing to the higher authority [Appendix A].

2. Research Materials and Methods

2.1. Study Site

This research method was conducted as PhD research work from October 2014 to May 2018 at the Universiti Malaysia Sarawak (UNIMAS), Malaysia. The materials and methods were connected with different parameters to enhance data collection, ISNAH Experiment, Specimens Tracking Process, Data Analysis and interpretation [38] as below:

2.2. Sample Size and Study Design

All specimens were housed in a room with controlled temperature 36.4°C in cat and 36.7°C in dog with breathing rates, respiration, blood pressure and feline body mass index [39]. The experimental design was randomly divided into three experimental groups with Body Mass Indexes including obese, normal and underweight (Table 1), and observed the impact of wireless sensor networks towards tracheas among them in the light and dark environments. The test samples in this study were dogs and cats.
Table 1. Sample cat and dog with BMI category
     
The study design was linked with different parameters, such as: physical parameters (Table 2), specimen’s selection, Impact of Sensor Networks towards Animals and Human beings (ISNAH) experiment, data collection and compilation, data analysis and interpretations. The study design showed different parameters in Figure 1.
Table 2. Sample cat and dog with BMI category
     
Figure 1. Study design of Processed Wireless Sensor Networks

2.3. ISNAH Experiment

The study necessitates an integration of methods used in wireless sensor networks towards animals’ bodies and identified its implication. This envisaged the research taking in matter-of-fact research elements to investigate issues hoisted in the study, primarily targeted at SMART devices like telematics’ users towards specimens. Telematics is a smart device, consisting of a scanner, recognizer, detector, global positioning systems (GPS) and global navigation satellite systems (GNSS). The fieldwork conducted in the studied area within January 2015 to January, 2017. ISNAH Experiment is the novel and uniqueness experiment which includes the Impact of Sensor Networks towards Animals [40]. The ISNAH process showed the necessary components in Figure 2. This is a multi-diversified experiment in connection with sensor technology to augment non-communicable diseases among animals and the human body [41].
Figure 2. ISNAH Process [15]

2.4. Study Process

The study examined two specimens, one is dog and another one is cat among 14 individuals for identification of this misuse application. These animals are available in the study area and suitable for experiment. The study selected sound health two species (14 individuals) with Feline Body Mass Index (FBMI), body temperature, breathing rate, respiration and blood pressure [42]. The experiment took at dark and light conditions. The specimens stayed in specific geographic locations and put the individual inside the iron case (size: 3.5′x 2′x2.5′). Then measurement of an individual's coordinates location includes longitude, latitude and ellipsoid height with GPS and GNSS identifiers. From the field observation, the Automated Radio Telemetry System is more effective in dark than light environments. For this purpose, the study examined the system on smart cell phones, telematics devices, iron cage and individual species separately. The experiment continued at five locations, viz. (i) Location A with light environments but no WiFi, (ii) Location B with dark and light environments including WiFi, (iii) Location C with dark and light environments including WiFi, (iv) Location D with light environments but no WiFi, (v) Location E dark and light environments including WiFi.

2.5. Sensor Disease Spreading Process

Common Acute Sensor Infections and Disorders (CASID) is the new term, which indicates the sensor diseases produce and spread through processed radio frequency of advances in sensor technology. When this processed radio frequency is tracked in GPS positions towards living cells, particularly human beings and animals’ bodies. The sensed living cells block electron movement and produce different types of disorders or diseases in the affected organ of the body. The CASID implies a formula as,
(i)
Where, N= the number of sensor network generation processed response signals.
C= the producing sensor diseases including CASID.
The cyber hackers are misusing the wireless sensor technology due to expanding processed radio frequency coil at longitude, latitude and ellipsoid heights. These processed radio frequencies are disseminating to a human body’s GPS coordinates points through a clouding system around the world. The cyber hackers are staying at geographic locations and produce different types of diseases, particularly Coronavirus disease in the human body. The hackers select the specific organ of the body as a fixed GPS location, including (i) Office room, (ii) dining room, (iii) Bed room, (iv) Wash room, (v) Meeting and conference room, (vi) Media / communication room, (vii) Computer / Network Server room, (viii) Mobile / Telephone room, (ix) TV / Theatre room, (x) kitchen, (xi) Dressing room, (xii) Healthcare room, and (xiii) Other GPS location. The sensor disease can produce through the following steps, which as shown in Figure 3.
Figure 3. Sensor Disease spreading process

2.6. CASID Recovery Process

CASID implies the common acute sensor infections and disorders. The CASID recovery process is simple and easy, which includes different components as shown in Figure 4. These are (i) disease recovery components, (ii) Sensor health quality services, (iii) Improvement of wireless health sensor trained-up options, and (iv) Sensor health community networks.
Figure 4. Corona disease recovery system

2.7. Ethical Consideration

The study is a part of PhD research work at UNIMAS, Malaysia, which was approved by the Senate and Graduate Study Committee. Every ethical issue was discussed with the COVID patients including underweight, normal and overweight, regarding the study and informed written consent were obtained.

2.8. Data Compilation

Quantitative and qualitative related bio-sensor data were obtained through ISNAH experiment while secondary data were obtained from diverse sources. All collected data were compiled for analysis according to findings.

2.9. Data Analysis and Interpretation

All general information regarding the occurrence of specimens, status and affected condition were checked for accuracy from the different sources and sources of information were also verified. The compiled and processed data were involved in the preparation of the data master sheet and assimilated into suitable systems used in the results and other segments consecutively. The data were compiled and analyzed for presentation and interpretation using standard data analysis software like MS Office Suite 2016 and SPSS version 26.

3. Results

3.1. Identified of Individuals’ Location and Tracking Time

The study identified species location from sensor devices at light and dark environment conditions. Individual’s location is recognized with body reflection through sensor technology within GPS locations. Using optical distance through processed radio frequency, the sensor device scanned the individual's location at least 30 ways for tracking. such as: (1) Individual’s active open eyes, (2) Active mobile phone, (3) active computer or laptop within eyesight (even if it is off, if there is an electrical connection), (4) staying at TV, fridge and Air Conditioning boundary, (5) opening sensor electronic devices, if there has electrical connection, (6) active individual’s retina or sense site index, (7) speaking words softly or loudly, (8) Sneezing, (9) Breathing more or less, (10) Sudden cough softly or loudly, (11) hiccups, (12) urination/ micturition sudden, (13) Sudden flatulence, (14) Bowel movements, (15) Suddenly itching in body and other organs such as ears, head, hands and feet, (16) Teeth grinding sudden, (17) Face suddenly fades /cyanosis, (18) Suddenly running nose, (19) Feet suddenly ache, (20) Hands suddenly grind, (21). Backside / sciatica suddenly itches, (22) Fingers suddenly tingling, (23) Suddenly get angry, (24) Suddenly feel very hot or very cold at instant location, (25) Suddenly feel very hungry or thirsty, (26) Making suddenly noise, (27) Suddenly feel sick, (28) Suddenly screaming, (29) Suddenly stomach ache, (30) Crying at instant location, (31) Ecstasy or happiness suddenly, (32). Suddenly move at undulation place/stair, (33). Gossip with others nearby.

3.2. Sensor Reflection at Dark Environment

Processed wireless sensor networks reflect the dark environment among the body mass index patients. The study continued tracking towards cat and dog species at dark conditions. These processed sensors are more sensitive towards obese dog within 5 minutes and obese cat within 7 minutes affected to the whole body, particularly tracheal organ, which as shown in Figure 5. From the ISNAH experiment, the study represents human body transmission with sensor disease, particularly coronavirus disease or COVID-19.
Figure 5. Impact of processed wireless sensor networks at dark environment
Responsiveness on sensor disease studied among cat and dog within the affected time can be estimated using the equation developed through polynomial analysis. Here the study expressed the approach through the following equation as:
(i)
(ii)
Where, y is the affected time on censored dog and x is the affected time on censored cat, with underweight, normal and overweight species in coronavirus at dark environments. Equation (i) has adjusted with the equation (ii) R2 (coefficient of multiple determinant of 0.7778 with standard error of estimate on observed mean. The value of R2 is equivalent to 1, which indicated censored time was affected towards the animal's body, particularly at trachea. So, the stated equation is accepted. The developed equation was then employed to stimulate human’s sensor disease consciousness regarding wireless sensor networks with processed radio frequencies in BMI status. If the value of R2 is negative, then the approaches between observed censored time and simulated values estimated effects on human trachea to augment the causes of coronavirus disease. The fluctuated radio frequency affected sensor disease on animals and human beings positively.

3.3. Impact of Processed Radio Frequency at Light Condition

Impact of processed and fluctuated radio frequencies are also positive in animals and human beings for sensor disease, particularly coronavirus disease. The study has gone tracking towards dog and cat species at light environmental conditions. These processed sensors are less effective, including underweight dogs taking 15 minutes and underweight cats within 12 minutes, which is shown in Figure 6. From the ISNAH experiment, the study represents human body transmission with sensor disease, particularly coronavirus disease or COVID-19 in a light environment.
Figure 6. Impact of processed wireless sensor networks at light environment
Receptiveness on sensor disease studied among dogs and cats within the affected time can be estimated using the equation developed through polynomial order. The following study expressed the red line through the equation (i) and (ii) as:
(i)
(ii)
Where, y is the affected time on censored dog and x is the affected time on censored cat, with BMI species effect in coronavirus disease at light environment. Equation (i) has adjusted with the equation (ii) R2 (coefficient of multiple determinant of 0.7628 with standard error of estimate on observed mean. The value of R2 is equivalent to 1, which indicated censored time was affected towards the body, particularly at trachea. So, the defined equation is also recognized. The established equation was then active to stimulate human’s sensor disease awareness concerning processed wireless sensor networks. If the value of R2 is fluctuated, then the approaches between observed censored time and simulated values estimated effects on human trachea to augment the causes of coronavirus disease. The light environment is suitable for sensor disease in animals or human beings negatively.

3.4. Integrated Impact of Sensor Networks

From the study of misuse of telematics, it observed that the examined species- cat and dog felt uneasy and after a few moments, they sensed laryngitis with fever in body. Immediately the cell phone removed and disconnected the wireless sensor network from the body area and changed the existing location. During medication time, the study also observed that both animals are weak and felt pain at trachea. The study identified that the animals were suffering from tracheal infection and fluctuated body temperature. The radio frequency also impacts on tracking effective time to animals, which is shown in Figure 7.
Figure 7. Tracking time towards species at dark and light environments
In a dark environment, underweight species suffer weakness and are sleepy within 15 minutes but 25 minutes in a light environment. On the other hand, overweight and obesity species suffer from corona symptoms within 7 minutes in a dark environment, but 12 minutes in light conditions. For coronavirus infection, cyber hackers scan the sensor via GPS to first confirm the current location of the person, animal or object and create symptoms of the corona. Cyber hackers can then censor specific parts of your body to make you sick according to the distance of the frequency or to stop you from breathing through the misuse of sensor technology. And if you stop breathing, your death is certain. Thus, by misusing node frequency, a person or an animal can be made sick or killed in corona, and by misusing distributed frequency, people, animals, cows, goats, poultry, birds, fish or other animals can be made sick in corona together or it can be killed. Cyber hackers block the movement of electrons in the clouding process through telematics devices between humans, animals and objects.

3.5. BMI and Processed Radio Frequency

COVID patients with BMI types including underweight, normal, overweight are affected in processed wireless sensor networks at GPS location in the optical distance due to active open eyes. The underweight patients were affected by coronavirus within medium time (12 minutes) tracking in a dark environment, but overweight and obesity COVID patients were affected sick in less time (7 minutes) than the underweight, which is shown in Figure 8. Overall, all people are affected in a short time by the processed wireless sensor network at GPS position in a dark environment than that of light environmental conditions.
Figure 8. Coronavirus affected times among BMI category patients

3.6. Occurrence of Coronavirus Infection with Sensors

For coronavirus infection, Cyber hackers first scan the sensor via GPS to confirm the current location of the person, animal or object and create symptoms of the corona. Cyber hackers can then censor certain parts of your body to make you sick, depending on the distance of the frequency, or to stop your breathing through the misuse of sensor technology. And if you stop breathing, your death is certain. Thus, by misusing node frequency, a person or an animal can be made sick or killed in corona and by misusing distributed frequency, people, animals, cows, goats, poultry, birds, fish or other animals can be made sick in corona together. Or can be killed. Cyber hackers block the movement of electrons in the clouding process through telematics devices between humans, animals and objects. Due to processed sensor networks, the wireless sensor first generation device produced 6 diseases according to application of stated formula, 4N3 + 2. But it depends on the user’s potentiality between country to country's network security. According to fourth generations, 258 sensor diseases produced, but physically observed that 362 sensor diseases have already produced from options, which as shown in Figure 9. Here, the CASID implies common acute sensor infections and disorders. According to ISNAH study, due to fixed GPS locations, these CASID converts into diseases, but changeable GPS positions with demand requirements, the patients recover these sensor diseases. It is also alarming that without dynamic sensor security networks, the CASID will be dangerous in future for living cells, as for example 4002 types of infections and disorders in tenth generation.
Figure 9. Worldwide sensor infections and disorders

3.7. Coronavirus Disease Spread through Wireless Sensor Technology

Telematics is a type of sensor light made with sensor technology, which works in combination with atmospheric waves. Cyber hackers are scanning the retina of the human eye to know the current location and monitor every moment. As a result, your location will be known immediately wherever individuals open their eyes at the country or international border and their activities will go to the sensor server with the picture. Because the sensor network is adjusted to your vision in the atmosphere. In addition, individuals are sitting / lying in the office or at home, working, eating, sleeping, etc. on a daily basis. At this time, even if you have a mobile phone or sensor device around you, your location is easily known. Moreover, even if you do not have a mobile phone, your location can be known through words, laughter, tears, high-cough or open eyes. Cyber hackers find out the distance of different parts of your body from your surroundings through telematics devices, then digital scanning is done from the neck to the head of your body with software like CT (Computed Tomography) scan or MRI (Magnetic Resonance Imagery). Then the low frequency electromagnetic sensor force is applied to the voice box and trachea of the place through smart remote sensing with the help of telematics. For a while, the person feels a tingling sensation, body temperature rises, sneezing-coughing, or high-hiccups and body fades, runny nose, loss of appetite, and dryness in the airways. After the SMART mobile sensor contracts, the airway becomes constricted and the tracheal cartilage becomes more constricted and the air stops moving from the lungs, causing the person to have difficulty breathing and die within minutes. And Cyber hackers spread the word in the media that he died after being attacked by Corona. When a person realizes that he has or is likely to be infected with corona, he should immediately go to a place without a network, without going to a hospital or health center. He will stay in that place in silence, without any words or words, will only communicate with gestures. No electronic device or mobile phone can be used at that time until the condition of the body is normal. Again, if a person goes to a hospital or clinic by mistake, he is more likely to die, because in those places, Cyber hackers come in secret and will ensure death by tracking with wireless sensor technology from hiding beside him. Mainly three organs of the patients are affected in coronavirus including lung, larynx and trachea (Figure 10).
Figure 10. Block air movement through misusing of sensor technology within GPS location

3.8. Body Attack with Processed Wireless Sensor Technology

Corona is a wireless-sensing technological virus that blocks electron movement at trachea. These block activities were occurred in different steps from smart devices like mobile phones, remote mobile phones, telematics or satellite phones with disseminating of fluctuated or same characteristics frequencies to infect individual’s organ at GPS positions including longitude, latitude and ellipsoid height, which as shown in Figure 11. It obstructs the movement of oxygen / carbon dioxide in various parts of the body, especially in the throat or trachea, impedes the movement of electrons in the body, and it also hampers the flow of blood in the aorta. Thus, individuals were infected with different diseases, like corona, laryngitis, fever, cough-cold, flux, dizziness, tracheal cancer, and tracheal deviation. In this way, individuals fall ill,eventually exposed to die due to swayed frequencies. From the ISNAH experiment, overweight obese animals were sickened by the sensor in the dark and died in 7 minutes, and in 12 minutes in the light, whereas light and normal animals became sick in the dark in 12 minutes and in the light in 25 minutes. That is, the animals were sick twice as often in the light. Sensor technology, however, is more sensitive to dark environments than light to make these animals sick. If the time and frequency of the experiment could be increased or doubled, it would have a negative effect on the animals.
Figure 11. Corona attack with processed radio frequencies through wireless sensor technology

3.9. Coronavirus Recovery Rate

The Coronavirus disease recovery rate varied in different situations including underweight, overweight and obesity patients, light and dark conditions, active GPS sensors and locations, wireless sensor networks and active open eyes. The recovery rate of coronavirus was 93.10% in February 2020, but in March 2020, it decreased at 80.71%. On the other hand, due to recovery awareness among COVID patients, it was increased to 97.10% in January 2021, which is shown in Figure 12. All coronavirus diseases are produced by cyber hackers at GPS positions through misusing of wireless sensor networks. From the higher study, only 3% of respondents are known to have processed sensor networks.
Figure 12. Corona recovery worldwide from February 2020 to January 2021

3.10. Case Study on Patients with Corona

Patients with Coronavirus were testified as a case study at Sylhet division in Bangladesh. About 150 COVID patients were sampled from North East Medical College at Sylhet. The distribution of these patients is from Sylhet, Sunamganj, Moulvibazar and Habiganj districts. Out of them, most patients were 65 between the age limit on 30-39 including male 48 and female 17. Other aged patients were 48 at age 20-29, 22 at age 40-49 and only 15 at age 50-59, which is shown in Figure 13. The maximum ages patients are downwards, which is shown as a logarithmic trendline. From the case study, the recovery rate from COVID-19 was 100% and no deaths in this study.
Figure 13. Case Study on Corona patients in different ages

3.11. ISNAH Effect on Living Cells

The ISNAH test is the impact of the sensor network towards animals and human beings, i.e. the effect of the sensor network on humans and animals. From the study developed a formula on the ISNAH effect, which is known as the ISNAH effect. The formula is: “Due to the active sensor technology, every human, animal or object is affected by the fluctuated frequencies of its movement through electromagnetic transmission within the boundaries of the body located in the GPS position, and this effect is proportional to its weight and disproportionate to its GPS positions. As a result, the person, animal or object is damaged by the changing waves and for recovery systems, the object should change existing location instantly”. That is, the ISNAH effect is the weight / GPS position of the object.
Overall findings include, (i) Processed wireless sensor networks produce coronavirus disease within GPS positions due to active open eyes. (ii) Humans locations are identified with wireless GPS sensor cameras due to creating hiccups, yawning and flatus in light and dark environments.

4. Discussion

The finding of the study is on the effect of sensor networks towards an individual's origins of corona through misusing sensor technology. The study also represents the oxygen flow speed fluctuates with infection due to misuse of wireless sensor networks. The findings reflect the importance in corona management through prevention and treatment that the physicians provide, which fails to recover due to access abusing the sensor network’s environments. The study demonstrated the signs of individual’s location augmenting causes of corona in the dark and light environment within BMI status. In the dark environment, the obese people are more vulnerable than normal and thin individuals and vice versa in the light environment. The study illustrates to test the radio frequency of patients’ coordinates by RFID (Radio Frequency Identification) detectors with GPS (Global Positioning Systems) locations, whether the actual radio frequency pressure was abnormal in the body of those suffering from corona due to abuse of radio frequency. Each sensory system has transformed tissue containing an array of fixated neurons to sense and transduce specific physical stimuli in optical sights [43]. Human eyes are the powerful natural close circuit camera, which focuses optical sight within a GPS position. Through assimilating adaptive optics micro-stimulation with high-speed eye tracking, the retinal function can be explored at the level of the individual cone photoreceptor in active eyes [43]. The eye offers one exception to this situation, with the cornea and lens affording a view of the retina that is only obscured by imperfections in the optics. Recent advances in ocular imaging now make it possible to overcome these imperfections and image individual photoreceptors in the living retina [44]. Besides, the strength and directions of temperature and orbital vibration signals can be monitored with sensor devices [103].

4.1. Corona as a Sensor Technological Virus

Corona is a sensory technical virus to spread as a non-communicable disease in animals and human beings. This virus is not biological,it is spread by technological programming and remote sensing. But somebody and institutions demonstrated that coronaviruses were found in bats [134]. Actually, these viruses were produced by cyber hackers through processed wireless sensor networks and receptors from individual’s retina. That's why after the introduction of corona in China, it spreads directly to Italy and later to other countries without spreading to neighboring countries. This is because a group of cyber hackers were directly abusing technology through the Clouding Sensor Network. Moreover, the symptoms of diseases like Corona, SARS, MERS and Ebola are almost the same, only the names are different. Wherever a person or animal is in the state of consciousness with open eyes, the movement of electrons according to the position of the organ in that person's body can be obstructed by telematics in the GPS position, resulting in the above symptoms. That's why Corona is a technological virus. When cyber hackers misuse homogeneous or procedural frequencies to a specific person or animal at a given geographical distance through sensor technology, the person soon develops the following symptoms and becomes ill, such as: (i) sudden yawning, (ii) sneezing, (iii) cold, (iv) Fatigue, (v) Cough, (vi) Fever, (vii) Hiccups, (viii) Discoloration, (ix) Sore throat, (x) Increases asthma, (xi) Anorexia, and (xii) sudden difficulty in breathing. This effect disseminates from smart mobile phone, where two thirds of the global populations are unique digital phone subscribers [36]. Moreover, no death in corona disease at some countries and territories due to technological awareness, such as, (i) Cambodia, (ii) Laos, (iii) Vanuatu, (iv) Dominica, (v) Macao, (vi) Micronesia, (vii) Samoa, (viii) Wallis and Futuna, (ix) Marshall Islands, (x) Anguilla, (xi) Saint Pierre Miquelon, (xii) Solomon Islands, (xiii) Vatican City, (xiv) Greenland, (xv) Falkland Islands, (xvi) Saint Kitts and Nevis, (xvii) New Caledonia, (xviii) Timor-Leste and (xix) St. Vincent Grenadines [8]. On the other hand, maximum deaths in some countries due to lack of dynamic sensor security, (a) The 389,621deaths from COVID-19 in USA, which is the highest in the world, (b) The 204,726 deaths in Brazil, which is the second ranking in the world, (c) The 151,564 deaths in India at third position in the world, and (d) The 135,682 deaths in Mexico at fourth ranking in the world [8].

4.2. Who is Creating the Corona Virus?

A team of Cyber hackers has created 362 diseases till to December 31, 2020 [Appendix C] including coronavirus disease through misusing of advanced sensor technology in humans, animals and plants worldwide, and is creating more new diseases through cutting edge nano-sensor technology. Cyber hackers have a four-member of management team. Three of them are involved in the operation and one is a sheltered for them. The pseudonyms of these four are: (i) Tangal Pharaoh Bari Hatem, (ii) Narsi Nimrud Jasim, (iii) Chichang Karun Nizam, and (iv) Mohakhali Candle Taj [135]. Each of them has four sub-groups. Each subdivision has a separate division of responsibilities based on area or country. They use sensor technology from time to time to create new names in human or animal bodies for specific frequencies with telematics, spreading them in different ways. Again, they spread in the media that the person concerned had died of such a disease. In this case, you have to be very careful. The research has shown from the ISNAH (Impact of Sensor Networks towards Animals and Human beings) effect that the GPS position of humans and animals can be determined by coding the retina light rays of their eyes. Digital poisoning at the GPS location interferes with the movement of electrons in the body of humans and animals, i.e. oxygen in the trachea and blood flow to the heart. Cyber hackers create this barrier through misusing of sensor technology within GPS location. Educational institutions were closed due to pandemic coronavirus. According to policy, vaccines are limited for school students. From my study, all animals and human beings are affected in processed wireless sensor networks. So, the vaccine policy is also bouncing message, if it is verified its authentication.

4.3. How to Detect Cyber Hackers

For effective measure, the higher authority takes necessary action against the misusers of sensor technology. But the authorities are not aware the global cyber crime due to lack of trained-up officials on advances in nano-sensor technology. For this reason, there is a combination between general public and administration for detecting the cyber hackers at local, national, regional and global levels. By co-operating with the police and the public, cyber hackers can be detected and appropriate and dynamic measures can be taken to remove corona disease through law and administration [135]. However, no words, sounds, mobile phones, wireless / networks can be used while searching for cyber hackers. For their own safety of the security team, the police can use weapons and the public can use sticks or defensive measures. All countries must have all kinds of networks and electricity off during special operations at the same time. And when meeting all the acquaintances / strangers, the higher authorities have to make sure that the smartphone or electronic device of the person concerned is off or 6 feet away, so there is no need to be worried or frustrated. Allah said (interpretation of the meaning): “And do not be anxious nor grieved” [80].
Telematics is a type of sensor light made with sensor technology, which works in combination with atmospheric waves. Cyber hackers scan the retina of the human eye with sensor technology to find out its current location and monitor every moment. The advantage of using decision support interlinks with wireless sensor network [47]. Recent progress in the use of bio-metric identifiers and simplified electronic medical record systems will mean that this is possible [48]. As a result, your location will be known immediately wherever you open your eyes at the country or international border and your activity will go to the sensor server along with the image. The sensor network has to adjust to your vision in the atmosphere. Moreover, you are sitting / lying in the office or at home, working, eating, sleeping, etc. on a daily basis. At this time, even if you have a mobile phone or sensor device around you, your location is easily known. Moreover, even if you do not have a mobile phone, your location can be known through words, laughter, tears, and high-cough or open eyes. Cyber hackers find out the distance of different parts of your body from your surroundings through telematics devices, and then digital scanning is done from the neck to the head of your body with software like computed tomography (CT) scan or Magnetic Resonance Imagery (MRI). Then the low frequency electromagnetic sensor force is applied to the voice box and trachea of the place through smart remote sensing with the help of telematics. For a while, the person feels a tingling sensation, the body temperature rises, sneezing-coughing, or yawning, hiccups and the body fades, hypnosis, runny nose, loss of appetite and dryness in the airways. After the smart mobile sensor is contracted, the airway becomes constricted and the tracheal cartilage becomes more constricted and the air stops moving from the lungs, then the person suffers from shortness of breath and dies within a few minutes. And cyber hackers spread the fake word in the media that he died after being attacked by Corona. Allah (The Creator) said in the Noble Quran as [87]: Evil (sins and disobedience of Allah, etc.) has appeared on land and sea because of what the hands of men have earned (by oppression and evil deeds, etc.), that Allah may make them taste a part of that which they have done, in order that they may return (by repenting to Allah, and begging His Pardon).

4.4. Treatment

If the corona virus was biological, its treatment would be very quick. But because it is a sensor technological virus, it is very difficult to get proper treatment. Although various companies and organizations are talking about the discovery of anti-corona, how effective it will be in curing the disease is a matter of dynamic research. The research has shown that 80% of the disease needs to be treated through psychological and 20% through physical therapy and medicine. Controlling seven places for sustainable non-communicable disease management, this is to prevent the state-of-the-art of various aspects of wireless body area sensor network [54]. Moreover, the advice of a doctor experienced in medical sensors can be taken in this regard to advance the field of disease care [55]. If a person lives in a remote area where there is no regular registered doctor. Then he has to think of alternative arrangements. For example: as soon as any symptoms of corona disease appear, you need to move quickly. There will be no mobile phone or Wi-Fi of any kind with any person moving to a new place, and no words or words will be spoken, all kinds of gestures will be communicated until normal. Individuals stay 2-6 feet away in each case for at least 2 to 6 minutes. The network control unit or jammer machine or network isolator must be set up where the sick person will be located. Whenever a person feels sneezing, coughing, yawning chills and headache or discomfort, his current condition must change immediately. The sick person should wear sunglasses over his eyes, never sleep or stand in the dark, and drink regular lemon-ginger tea until he recovers. In addition, a teaspoon of lemon juice, a paracetamol (800 mg) and a glass of oral saline should be taken together. Regularly the person eat garlic, black cumin, neem leaf powder and honey together and change his/her bed position from time to time for good health and be very careful in using smartphone. Anti-radiation bed and mosquito net must be used in bedroom and facility-based care when it is needed [56]. The obese patients are risk in COVID-19 due to respiratory syndrome [88,89,90,91,92,93,94].
The treatment of coronavirus disease is simple. It includes three steps, which as shown in Figure 14, such as: (a) Pre-treatment, (b) Treatment, and (c) Post-treatment and follow up.
Figure 14. COVID-19 Treatment Steps [15]
Designing of efficient biosensors for sensitive and selective measurement of specific biomarkers, is a significant step for the primary disease diagnosis, treatment, and management with emergency healthcare framework [45,46,53]. If the corona virus was biological, its treatment would be very quick. But it is a sensor technological virus, it is very difficult to get proper treatment. Although various companies and organizations are talking about the discovery of anti-corona, how effective it will be in curing the disease is a matter of dynamic research. Because, in my research, it has been found that 80% of the disease needs to be treated through psychological and 20% through physical therapy and medicine. Moreover, the advice of an experienced doctor in medical censorship can also be taken in this regard. The whole world today is worried about the treatment of corona virus disease (COVID-19). Because vaccines alone cannot cure corona completely. Therefore, with the joint efforts of doctors, nurses, administration and the general public, we need to move fast to recover from this disease. Therefore, the following rules will help us to move forward, which is known from the ISNAH test of PhD research. The rules are:
i. If a person suddenly suffers sneezing, hiccups, coughing, cyanosis, runny nose, flatus, chills, headache, discomfort or gasps after being in a certain place, immediately closes his eyes, wears sunglasses (anti-radiation glass), clothes black cloths and quickly changes his existing place to a new place. This is must do.
ii. The person can then wear sunglasses (anti-radiation glasses) with their eyes closed for at least 7 to 25 minutes in the new place, if the body feels abnormal or weak. No mobile phone, electronic device, telematics, GPS (Global Positioning System) or any sensor device will be with you while you are in the new place, but personal area network control unit (PANCU), anti-radiation bed, radiation free mosquito net can be used.
iii. If a person has or is likely to have corona disease, he or she must follow the above rules. The patient must follow the rules until he or she is completely healed.
iv. If individuals feel unwell or sick, mix one teaspoon of lemon juice, one paracetamol, two pieces of garlic, one teaspoon of black cumin, neem leaf powder, two teaspoons of honey and one glass of oral saline together in a slightly warm condition. And change the position of the bed from time to time and be very careful in using the smartphone for good health. If you do not recover, consult a good doctor immediately.
v. No recitation of the Noble Quran, Gita, Bible reading, any music, audio-video, any news, FM radio, any movie or lecture etc. can be heard or seen with mobile phone next to the pillow of any sick person. These can be seen or heard by placing a mobile phone 6 feet away from the boundary of everyone's body and wearing sunglasses. Therefore, mobile phones cannot be used in mosques, temples, classrooms, meeting rooms, etc., and system security and institutional network control units must be used in these places [135].
vii. If no solution or cure is found after following the above rules, the concerned patient or his guardian must consult a registered doctor and health expert. If a person lives in a remote area where there is no regular registered doctor. Then he has to think of alternative arrangements, which is discussed earlier.
viii. When doctors or nurses are ready to treat patients, they must wear anti-radiation sunglasses with accommodating room temperature. During consultation time, light environment is sufficient. But room darkness, wireless sensor networks, smart phones and sensor devices are restricted within individual’s body boundary.
ix. If the effects of corona disease are widespread in a geographical area, the local, regional and international mobile and sensor networks in that areas should be disconnected for 5 to 10 minutes or suitable time.
x. The sleeping room must be without network and sensor free, no person or animal in that room can ever use the wireless network, only to be damaged. The patient’s bed and mosquito net should be anti-radiation category at home and hospital.
xi. When meeting all acquaintances / strangers, including office assistants and housekeepers, make sure that the smartphone or electronic devices of the person concerned is turned off or 6 feet away. You can't meet with your own or someone else’s wireless sensor devices.
xii. The isolated room is set up Personal Area Networks Control Units with close eyes and changing options including GPS locations, GNSS distances and body boundary areas. If you have sensor device or RFID detector, you can detect the processed radio frequency in patient and switched-off immediately at real-time in GPS position, then the patient recovers from corona disease.
xiii. Individual can follow the yoga as a psycho-scientific treatment regularly. Because meditation is a good medication in all ages of males and females. It sustains cooling in brain and cleansing in mind due to proper respiration.

4.5. COVID Care Pathway

The COVID patients are being focused with regular follow-up to instigate their recovery phase after home isolation. They take in terms of sensor technological and nutritional direction in their home-setting is frequently inadequate. The right information these COVID patients take in terms of nutritional support at their home-setting is accommodated suitably. The scientific experts and dietitians are being anticipated to support them with effective guidelines and a care pathway for healthcare setting at wireless network free place or personal network control area [106]. The area is always effective light condition, anti-radiation sunglass and nutritional supports for them till to fully recover.

4.6. Global Corona Disease Recovery Systems

COVAX is a global solution for COVID-19 treatment providing vaccines for controlling with effective testing and preventives measures [82]. Treatments give these tools to help patients to treat COVID-19 [83]. Furthermost people who suffer corona disease caused by SARS-CoV-2 will have only mild illness. Mild corona disease cases still can make individual feel crummy. But he/she should be able to rest at home with positive psychological mind and recover fully without a trip to the clinic or hospital. He/she should follow the personal body boundary network control unit or stay free Wi-Fi or Mobile Sensor Network till to sound health. Scientists, physicians and researchers are continually tracking contagions and recovery system. As a scientist, my findings for recovery is simple. During staying at home/office, he/she must be showed accepted signs or symbol except words/speeches to communicate with others and wears sunglasses for minimizing own’s optical sight. Mask use is not recovered from corona disease. Again, there is no relation between application of mask and corona recovery. But cyber hackers send messages to the main health administration for development of policy on mask applicability. Most health administrators have no idea on bouncing message and voice coding. As a result, they circulate policy to the security force. According to the rules and regulations, the security force monitors the general people. Public suffers in disease and punishment from cyber hackers and police respectively.

4.7. Sensor Disease Management

According to Isaac Newton’s 3rd Law of Motion illustrated as for each and every action, there is an equal and opposite reaction. Modern wireless Sensor Technology has the same condition as for advantage and disadvantage in the application of processed and fluctuated radio frequencies. Due to processed radio frequencies, a lot of sensor infections and negative effects produce within positions of longitude, latitude and ellipsoid height. These infections and disorders convert into sensor diseases in living cells of human beings and animals’ body. Every sensor disease is dangerous due to blocking of electron transmission in GPS positions. This GPS coordinates points block the transfer of oxygen, carbon dioxide, water, blood and other fluid materials through misusing of processed and fluctuated wireless sensor networks. If individual is affected by this type of WSN, he/she must change his/her existing GPS location quickly for safety nets. Otherwise tends to being dead indeed within few minutes due to misapplication of overlapped and homogenous radio frequencies. The cyber hackers are misused these radio frequencies for spreading sensor diseases from January 1, 2000 to till date due to lack of effective sensor security. They produced 362 common acute sensor infections and disorders (CASID) till to December 31, 2020. They disseminate unwanted types of radio frequencies in human beings and animals’ body to spread CASID. Some diseases like COVID-19, heart attack, diabetes and cancer etc. are major sensor diseases from CASID. Someone can puzzle on my research or none can believe due to diverse causes, such as: (i) Habituated in Personalism, (ii) Lack of perfect sensor technological awareness, (iii) Superstition, (iv) Infodemic, (v) Nepotism with cyber hackers, (vi) Cyber hackers oneself, (vii) Obsolete person, (viii) Phobia person in sensor disease, (ix) The person, who kidnapped and threatened by cyber hackers, and (x) Cybercriminal. The CASID can result in significant morbidity, if not appropriately diagnosed and treated in real time and GPS location. There are some sensor parameters like fluctuated radio frequency, GPS location, optical sight, existing environment and body boundary areas of the spreading infections and disorders etc. are important guides to initial treatment strategies. When CASID is augmenting in living cell due to passive processed radio frequencies at optical sight within GPS location, it must treat as soon as possible. The CASID recovery management team consists of the following teams for rebuilding a CASID core team (Figure 15), such as (i) Real-time Anti-radiation processed intelligence device (RAPID) team, (ii) Spatial monitoring and reporting tools (SMRT) team, (iii) Patients’ antiradiation bed-room-zone team, (iv) Wireless sensor networks access control unit team, (v) Medical police and security team, (vi) Hospital co-management team, (vii) Team for management of patients, (viii) Emergency hospital petrol group, (ix) Clinical management team, (x) Laboratory technicians and experts, (xi) Corona disease/ sensor disease identification team, (xii) Intensive support and reporting team, (xiii) CASID case management team, (xiv) Corona disease/ sensor disease treatment, recovery and follow up team, (xv) Regular nurse’s forum, (xvi) Proactive doctor’s forum, (xvii) Personal Area Network control Unit (PANCU) and interface identifier team, (xviii) Intensive assessment and evaluation team, and (xix) Dynamic CASID Core Team.
Figure 15. Common Acute Sensor Infections and Disorders Recovery Management Team
These teams enhance the local, national and global health security due to proactive responsibilities and duties on sensor disease management in time. It is not an overstatement to mention that the world is fronting a number of crises at the geopolitical level [112]. Due to infodemic, few months lockdowns have been disrupted by irregular re-openings and irritation from a lack of harmonization between medical authorities [111]. The CASID Core Team can enhance the recovery of sensor diseases worldwide.

4.8. Global Uniqueness Research

Optical sensors are integrated with a radio transmitter/transceiver in a GPS position [115,116,117]. The wireless processed sensor network is a uniqueness research in relation with biology and sensor technology in advances. So, it advances in bio-sensor research to improve the capacity of healthy life. This is rare and limited awareness in the modern world due to integrated study for all generations. It opens the research door with scientific access to multidiscipline. There are some uniqueness in this research as (a) Quick sensor network affected towards man, animals, plants and landscapes, (b) Disseminate the distributed sensor network to the whole network areas through individual or group wise, (c) Large animals are more prone to be negatively affected by sensor telematics network because of peripheral congested environment and splitting high frequency, (d) The radio frequencies of telematics (500 to 999 mHz) were detected using Automated Radio Telemetry System within the 5 and 10 meter distances, and (e) Exposure high RFID detects to die.

4.9. Worldwide Potentiality

Ambiguous on the magnitude of pandemic impact, coronavirus could rapidly alter a geopolitical event. This virus tarnished global history due to lack of secure sensor technology with changing economic, technical, social and health impacts [114]. This learning has the potential to change the global direction for looking ahead. It can enhance security systems for teacher, medical doctors, nurse, officer, scientists, researchers, patient and other stakeholders. Experts have tried to implement ways of reducing this impact by encouraging pertinent institution to go competitive market with medical through alternative potentiality. Large potential on RFID technology uses including learning, research, servicing and access benefit sharing to achieve specific goals related to national health policy in connection with Sustainable Development Goals 2030.

4.10. Safety Geo-health-politics

The world is facing an unparalleled health crisis through misusing of cyber hacker’s activity [107]. Due to the spreading coronavirus, the geopolitical tensions are escalating, which hampers in global healthcare policies [108]. This pandemic is a tactical shock as the extreme threat to the global order and political leaders, which are interrupted the global economy, political relations and health policies through challenging the strength of humanities and social relations [109,110]. Sometimes political leader behaves an insane suddenly to the mass people due to tracking at his/her brain by the cyber hackers within GPS locations. Again, national political instability, mutiny among soldiers and army illegal empower etc. are occurred by cyber hackers through misusing of sensor technology like interfacing, voice coding and bouncing messages [15]. The world of geopolitics is shifting speedily exciting from a phase of virtual solidity to one. The disconcerting and insecure sensor network link to social, technical, and personal uncertainty is also conveying about cutting-edge technology and political changes. These are more inward looking not only nationalist but also individualist, protectionist and dogmatic shape due to undesirable situations [113]. Presently the integrated decision necessitates the reconsidering state policy approach and target-oriented achievements. So, it is urgently necessary the safety geo-health sensor technology for all civilians and the eminent political leaders.

4.11. Message of Sensor Technological War

COVID-19 is a message of third world war. The coronavirus has exaggerated the entire world, which escaped the horrors of the previous World War I and II. These coronaviruses were spreading unambiguously everywhere in all countries. People are already aware that it will take months if not years to end the COVID-19 conflict, which became painfully obvious that the conflicts during world war I and II would go on and on for months and years. Both these wars were also misnomers. The World War I ended with roughly 20 million people dying, which is comparison with COVID-19 deaths [136]. The coronavirus pandemic has confirmed the disturbing potential of viruses as a weapon of mass destruction, reduction of social rapport building, distancing in religious activities, which have transformed the concentration, dimension and trajectory of an undeclared third world war and, in its aftermath, could conceivably transmit about a revolution in the global order [137]. The world is in turmoil from racial injustice to rising inequalities due to pandemic COVID-19 [138]. These World Wars were named with retrospective effect to all generations. From the higher study, it is informed that COVID-19, suddenly earthquake, tsunami, cyclone, rainfall, forest fire, building burning, load shedding, soldiers’ mutiny, plane demolish, family clash, vehicles’ accident, political instability, landslide, winter storm, building fallen down etc. have been occurred by cyber hackers due to misusing of wireless sensor networks.

4.12. Looking Ahead Research

As new technologies continue to emerge, human beings, animals and plant’s roles will continue to evolve, with each advance, bringing a safer and healthier future for both researchers and the students’ motto in their domains. As researchers, scientists, engineers and network specialists continue to make leaps forward with these innovations, more lives will be saved and more research will receive assistance. But there is general question, “who is secured in the world at the insecure wireless sensor technology, which as shown as Figure 16. Every life is better than smart phone and wireless sensor networks to depend upon in awareness. Risk of reinfection depends on the likelihood of re-exposure to infectious cases of coronavirus, who are mild to moderate the replication-competent virus has not been recovered after 10 days [118-132]. So, the present world is in risks to live insecure life. The chief executive of State of United Nations is also insecure, if he/she has rapid action batalian (RAB), army, special force, police and other security team due to misusing with nano-sensor technology and open active individual’s eyes. The study mentions for effective future research directions for global public health security.
Figure 16. Who is secured by wireless sensor networks within GPS location

4.13. Risks in Research

The major challenge is the stimulation of individual neurons is difficult when individuals sit within an array of similar receptors, with the array itself hidden inside a sensory organ [48]. False interface, bouncing message [Appendix B] and voice coding [Appendix A] are increasing through sensor technology due to lack of effective security [16]. Because, sensor nodes are capable of transferring data without physical medium [102,104]. Cyber hackers spread the fake information in the media that he died after being attacked by Corona [16]. Despite the spread of information technology, it is very difficult to find the right antidote to cure corona disease [57]. Many mobile phone users are not aware to overcome the health security measures of sensor technology [58,59]. Cyber hackers are scattered among different groups of society and are arbitrarily abusing it [60]. Many people are not aware of the police and other security forces due to using GPS data from the environment [60,105]. Moreover, many people are using smartphones without control of the waves, without following any rules and regulations [60]. As a result, various non-communicable diseases including corona are increasing abnormally [15,61]. Therefore, corona is a huge challenge for the World Health Organization, including the national governments, organizations and communities [7]. There are huge misuse of sensor technology and cost of update technology in health management [53]. The research organization develops a set of recommendations for all countries to recover [54] corona with its challenges. The use of low-cost digital sensor devices can measure vital signs in risks [55]. At present, few low-income countries have reliable sensor data despite substantial investments in health information systems [56,62] but sensor security system is weak. The crowdsourcing data about providers, facilities, and health systems is likely to grow as more people with sensor in risks [63]. Violence against healthcare technology providers has increased worldwide in the context of COVID-19 for challenging treatment with insecure technology [64,65,66]. Some people believe to reduce spread and deaths due to using facemasks, social distancing, and avoid handshaking [67]. But these are bouncing messages from cyber hackers sending to the higher authority, which are almost fake. Cyber hackers highlight scamming mails, voice calls and electronic news for media exposure as an infodemic with phobia formula accelerating negative psychology towards mass people [68 -79,86] during the management of disease outbreaks as a global problem [81]. Moreover, COVID-19 treatment situation has not improved yet due to discriminatory nature of the existing health system [84].

4.14. Recommendations

The study commends to be very vigilant to stay healthy from the misuse of sensor technology. That is why there are some recommendations in the field of awareness, which we can all benefit from following, such as:
(a) Individual should close eyes with wearing sunglasses and quick-change body boundary without uttering 5-10 minutes.
(b) When meeting all acquaintances / strangers, including office assistants and housekeepers, make sure that the smartphone or electronic device of the person concerned is turned off or 6 feet away. You can't meet with your own or someone else's mobile phone.
(c) Avoid audio-video, talking and use of all kinds with smart mobile phones in and around the bed in open eyes.
(d) The sleeping room must be without network and sensor free, no person or animal in that room can ever use the wireless network, only to be damaged.
(e) The patient’s bed and mosquito net should be anti-radiation category at home and hospital.
(f) To have peace of mind and not to stay in one place or bed, to move regularly and to keep occasional body movements.
(g) If the effects of corona disease are widespread in a geographical area, the local, regional and international mobile and sensor networks in that areas should be disconnected for 5 to 10 minutes or suitable time.
(h) The higher health authority should formulate the dynamic global health policy on the priority of cutting-edge sensor technology.

5. Conclusions

To conclude, the World Health Organization is monitoring the spread of the virus and the viral situation in order to rapidly expand scientific knowledge about the new virus. And the agency is cooperating in consultations and intensive investigations to take necessary action on a number of issues to protect the health of neighboring countries and individuals and prevent its spread. Due to the corona virus, the doors of the world such as business, trade, education, initiation, movement and daily life are being closed. This should be monitored the illegal activities of Cyber hackers under the law with the joint cooperation of doctors, nurses, general public, police and concerned organizations. As a result, the security of the sensor technology will ensure that there will be no more corona in the area. However, no words, sounds, mobile phones, wireless / networks can be used while searching for Cyber hackers. For their own safety, the police can use weapons with sunglasses and the public can take sticks or defensive measures. In all countries, all types of networks, including mobile networks, CCTV and electricity must be turned off during special operations. However, the instructions for a special operation cannot be typed or exchanged on a computer or mobile phone, the operation guideline must be handwritten before the operation, otherwise the operation will not be successful. Therefore, as long as Cyber hackers are not caught through the law, above 362 diseases including coronavirus disease will not be free from the world [Appendix C].

6. Declarations

Funding
This research work is a part of PhD Thesis, which was funded by the Zamalah Postgraduate Scholarship of UNIMAS, Malaysia and also sponsored by the Information and Communication Technology Division, Ministry of Posts, Telecommunication and Information Technology, Government of People’s Republic of Bangladesh. The funders had no role in the design of the research, in data collection, analyses or final interpretation of data, in the writings of the manuscript, or in the decision to publish the findings.
Data Availability
The data are being used to support the findings of this research work are available from the corresponding author upon request.
Competing Interests
The authors declare no potential conflict of interests in this research work.

ACKNOWLEDGEMENTS

The authors acknowledged the authority of Universiti of Malaysia Sarawak (UNIMAS), Malaysia for providing the Zamalah Postgraduate Scholarship for the completion of PhD degree. The authors are also grateful to the authority of the Information and Communication Technology Division, Ministry of Posts, Telecommunication and Information Technology, Government of People’s Republic of Bangladesh, for PhD Fellowship during the higher study in Malaysia. The authors acknowledged the authority of Northeast Medical College & Hospital (NEMCH) Pvt. Limited, Sylhet, Bangladesh for kind supports.

Appendix A: (i) False Interface and Voice Coding

Same event at RT-PCR, display positive, actually he/she was negative.
(ii) VOICE Coding
Voice coding converts to text, then text converts to voice and display in individual’s device from the bouncing voice of Honorable Presidents, Prime Ministers, Ministers, Senior Officials, Vice Chancellors, Principals, Managers etc. The Cyber hackers are disseminating these voices to others through wireless sensor technology. The receiver /followers didn’t verify its authenticity and follow accordingly. If he/she monitored the receiving voice physically or authentic sources (not technologically), then a lot of human beings will save indeed.

Appendix B: Bouncing Message

Appendix B
Background of this e-mail: This is bouncing e-mail. The original sender has never sent to the receiver. The cyber hacker was sent this through wireless sensor networks. For this reason, this e-mail is not available in institutional servers, google server and government server.

Appendix C: CASID

Appendix C

References

[1]  AFP. (2021, January 10). A year after first death in China, coronavirus source still a puzzle. Agence France-Presse (AFP), Wuhan (China), Issued on: 10/01/2021 - 04:20. URL: https://4m.cn/O9QTT (Accessed Time on January 11, 2021 at 10:00am).
[2]  Prothom Alo. (2021, January 10). One year after the first death in Corona, the source is still unknown. Dhaka, Bangladesh. URL: https://www.prothomalo.com/world/ (Accessed Time on January 11, 2021 at 7:00 am).
[3]  Ramirez, L. and Martin, D. (2021, January 10). A year after first death in China, coronavirus source still a puzzle. Agence France-Presse Wuhan and Shanghai, China. URL: https://4m.cn/bEIVS (Accessed Time on January 11, 2021 at 11:00 am).
[4]  Gulf News. (2021, January 11). COVID-19: A year after first death in China, coronavirus source still a puzzle. Agence France-Presse (AFP), Middle East. URL: https://4m.cn/BAAzl (Accessed Time on January 11, 2021 at 9:00 am).
[5]  Higgins-Dunn, N and Will Feuer, W. (2021, January 4). A year since COVID first emerged in China, the world battles its deadliest surge yet. Consumer News and Business Channel (CNBC), USA. URL: https://4m.cn/hbueJ (Accessed Time on January 11, 2021 at 8:00 am).
[6]  WHO (World Health Organization). (2020). Investing in and building longer-term health emergency preparedness during the COVID-19 pandemic: Interim Guidance for WHO Member States, July 2020. Geneva: World Health Organization. URL: WHO/2019-nCoV/Emergency_Prepare dness/Long_term/2020.1). Licence: CCBY-NC-SA 3.0 IGO.
[7]  WHO (2021). WHO Director-General's opening remarks at the media briefing on COVID-19 – 11 January 2021. URL: https://4m.cn/xuctU (Accessed time on January 12, 2021 at 10:00 am).
[8]  UNG (United Nations Geoscheme). (2021). WorldoMeter COVID-19 Data. COVID-19 Coronavirus Pandemic. January 13, 2021, 06:39 GMT. URL: https://www.worldometers.info/coronavirus/?utm_campaign=homeAdvegas1? (Accessed time on January 13, 2021 at 10:00 am).
[9]  UNCTAD. (2020). United Nations Conference on Trade and Development. The Impact of the COVID-19 Pandemic on Trade and Development: Transitioning to a New Normal. UNCTAD/OSG/2020/1, UN, USA. 1-113. URL: https://unctad.org/system/files/official-document/osg2020d1_en.pdf.
[10]  UWI. (2020). Fact About COVID-19. Key Messages and Actions for COVID-19 Prevention and Control in Schools. A collaborative meeting with technical support among UNICEF, WHO and IFRC (UWI). New York Head quarter, USA. Page 1-13. URL: https://4m.cn/beBVr.
[11]  Butun I., Ra I.H., Sankar R. (2015). PCAC: Power-and Connectivity-Aware Clustering for Wireless Sensor Networks. EURASIP J. Wirel. Commun. Netw., 1:1–15. DOI: 10.1186/s13638-015-0321-6.
[12]  Agarwal, N. and Hussain, S.Z. (2018). A Closer Look at Intrusion Detection System for Web Applications. Security and Communication Networks, 1–28. DOI: https://doi.org/10.1155/2018/96013.
[13]  WHO (World Health Organization). (2005). WHO Eastern Mediterranean Region: Joint External Evaluation Mission Reports. Geneva: World Health Organization, 2005.
[14]  Sohraby, K., Minoli, D. and Znati, T. (2007). Wireless Sensor Networks: Technology, Protocols and Applications. 1-376. Wiley-Interscience, USA. ISBN: 978-0-471-74300-2.
[15]  Miah, M.R., Rahman, AAMS., Khan, M.S., Samdany, A.A., Hannan, M.A., Chowdhury, S.H., Sayok, A.K. (2020). Impact of Sensor Technology Enhancing Corona Disease. American Journal of Biomedical Engineering, 10 (1). 16–26. DOI: 10.5923/j.ajbe.20201002.
[16]  Whitehouse, K., Jiang, F., Woo, A., Karlof, C. and Culler, D. (2004). Sensor Field Localization: A Deployment and Empirical Analysis. Technical Report, University of California, Berkeley, USA.
[17]  Whitehouse, K., Karlof, C., Culler, D. (2004a). Hood: A Neighborhood Abstraction for Sensor Networks. Proceddings of the ACM International Conference on Mobile Systems, Applications and Services. Boston, MA, USA.
[18]  Whitehouse, K., Karlof, C., Culler, D. (2004b). Getting Ad-Hoc Signal Strength Localization to Work. Technical Report. University of California, Berkeley, USA.
[19]  Lorincz, K., Malan, D.J., Fulford-Jones, T.R.F, Nawoi, A., Clavel, A., Shnayder, V., Mainland, G., Welsh, M., Moulton, S. (2004). Sensor Networks for Emergency Response: Challenges and Opportunities. IEEE Pervasive Computing, Special Issue: Octo-Dec, 2004.
[20]  Whitehouse, K. and Jiang, X. (2004). Calamari: A Sensor Field Localization Syste. URL: http://www.cs.berkeley.edu/kamin/calamari/.
[21]  Whitehouse, K. (2002). The Design of Calamari: An Ad-Hoc Localization System for Sensor Networks. Master’ Thesis. University of California, Berkeley, USA.
[22]  Tollefsen, W., Pepe, M., Myung, D., Gaynor, M., Welsh, M., Moulton, S. (2004). Irevive: A Pre-hospital Mobile Database for Emergency Medical services. International Journal of Healthcare Technology and Management, Summer version.
[23]  Welsh, M., Myung, D., Gaynor, M., Moulton, S. (2003). Resuscitation Monitoring with a Wireless Sensor Network. American Heart association, Resuscitation Science Symposium, Supplement to Circulation. Journal of the American Heart Association, October version.
[24]  Priya, S.P., Chowdary, V.A. and Dinesh, V.S. (2013). Wireless sensor networks to monitor Glucose level in blood. International Journal of Advancements in Research & Technology, 2(4): 322–326.
[25]  Chaudhary, D. and Waghmare, L.M. (2014). Design Challenges of Wireless Sensor Networks and Impact on Healthcare Applications. International Journal of Latest Research in Science and Technology, 3(2):110–114.
[26]  Abidi, B., Jilbab, A., and Haziti, M.E.L. (2016). Wireless Sensor Networks in biomedical: wireless body area networks. In: Procedings of the Europe, Middle East and North Africa Conference on Technology and Security to support Learning. EMENA-TSSL, SaidaOujda, Morocco, 3–5.
[27]  Wu, F., Xu, L., and Kumari, S. (2017). An Improved and Anonymous two factor authentication protocol for healthcare applications with wireless medical sensor networks. MultimedSyst, 23 (2), 195–205.
[28]  Kim D H, Lu N, Ma R, Kim Y S, Kim R H, Wang S, Wu J, Won S M, Tao H, Islam A, Yu K J, Kim T I, Chowdhury R, Ying M, Xu L, Li M, Chung H J, Keum H, McCormick M, Liu P, Zhang Y W, Omenetto F G, Huang Y, Coleman T, Rogers J A. (2011). Epidermal electronics. Science, 333(6044): 838–843. DOI:10.1126/science.1206157.
[29]  Gao W, Emaminejad S, Nyein H Y Y, Challa S, Chen K, Peck A, Fahad H M, Ota H, Shiraki H, Kiriya D, Lien D H, Brooks G A, Davis R W, Javey A. (2016). Fully integrated wearable sensor arrays for multiplexed in situ perspiration analysis. Nature, 529(7587): 509–514. DOI:10.1038/nature16521.
[30]  Wang X W, Gu Y, Xiong Z P, Cui Z, Zhang T. (2014). Electronic skin: silk-molded flexible, ultrasensitive, and highly stable electronic skin for monitoring human physiological signals. Advanced Materials, 26(9): 1309. DOI:10.1002/adma.201470054.
[31]  Sheridan C. (2014). Apple moves on health,drug developers shift into smart gear. Nature Biotechnology, 32(10): 965–966. DOI:10.1038/nbt1014-965a.
[32]  Zang Y P, Zhang F J, Di C A and Zhu D B. (2015). Advances of flexible pressure sensors toward artificial intelligence and health care applications. Materials Horizons, 2(2): 140–156. DOI:10.1039/c4mh00147h.
[33]  Zhao W X, Bhushan A, Santamaria A, Simon M and Davis C. (2008). Machine learning: A crucial tool for sensor design. Algorithms, 1(2): 130–152. DOI:10.3390/a1020130.
[34]  Vu C. and Kim J. (2018). Human motion recognition by textile sensors based on machine learning algorithms. Sensors, 18(9): 3109. DOI:10.3390/s18093109.
[35]  Labrique, A.B., Vasudevan, L., Kochi, E., Fabricant, R and Mehl, G. (2013). MHealth innovations as health system strengthening tools: 12 common applications and a visual framework. Global Health: Sci Pract, 1(2):160–71. DOI: 10.9745/ghsp-d-13-00031.
[36]  Pouschter, J. and Stewart, R. (2016). Smartphone ownership and Internet usage continues to climb in emerging economies but advanced economies still have higher rates of technology use. Pew Research Center. url: https://4m.cn/j8yTk, (accessed 2020, June 19).
[37]  WHO. (2020). Corona disease (COVID-19). Situation Report -151 (June19, 2020). World Health Organization, 1-17. url: www.who.org (Accessed time: June 20, 2020 at 10:00 am national time).
[38]  Kothari, C.R. (Ed.). (2004). Research Methodology: Methods and Techniques (2nd ed.), New Age International Publishers, 95–111.
[39]  Sha, H., Zeng, H., Zhao, J., and Jin, H. (2019). Mangiferin ameliorates gestational diabetes mellitus-induced placental oxidative stress, inflammation and endoplasmic reticulum stress and improves fetal outcomes in mice. European Journal of Pharmacology, 859: 172522. DOI: 10.1016/j.ejphar.2019.172522.
[40]  Miah, M.R. (2018). Assessment of Environmental Policy Instruments along with Information Systems for Biodiversity Conservation in Bangladesh. PhD Thesis. IBEC, UNIMAS, Malaysia. 1–480. URL: https://ir.unimas.my/id/eprint/24535/2/Assessment%20of%20Environmental%20Policy%20ftext.pdf.
[41]  Kays, R., Tilak, S., Crofoot, M., Fountain, T., Obando, D., Ortega, A., Kuemmeth, F., Mandel, J., Swenson, G., Lambert, T., Hirsch, B. &Wikelski, M. (2011). Tracking Animal Location and Activity with an Automated Radio Telemetry System in a Tropical Rainforest. Published by Oxford University Press on behalf of the British Computer Society. The Computer Journal, 1(1): 1–18, DOI: 10.1093/comjnl/bxr072.
[42]  Waltham. (2017). Feline Body Mass Index (FBMI). Waltham FBMI Calculator. 1–2. URL: https://jscalc.z6_io/calc/hORP8x2bWjQU7qxq.
[43]  Harmening, W.M., Tuten, W.S., Roorda, A. and Sincich, L.C. (2014). Mapping the Perceptual Grain of the Human Retina. The Journal of Neuroscience, 34(16): 5667–5677.
[44]  Williams, D.R. (2011). Imaging single cells in the living retina. Vision Res., 51, 1379 –1396.
[45]  WHO (World Health Organization). (2018). Emergency Care System Framework. Geneva: World Health Organization, 2018. URL: https://www.who.int/publications-detail-redirect/whoemergency-care-system-framework (accessed 17 June 2020).
[46]  McKay, D., Heisler, M., Mishori, R., Catton, H., Kloiber, O. (2020). Attacks against health-care personnel must stop, especially as the world fights COVID-19. Lancet, 395(10239): 1743-5.
[47]  Mitchell, M., Hedt-Gauthier, B.L., Msellemu, D., Nkaka, M. and Lesh, N. (2013). Using electronic technology to improve clinical care – results from a before-after cluster trial to evaluate assessment and classification of sick children according to Integrated Management of Childhood Illness (IMCI) protocol in Tanzania. BMC Med Inform Decis Mak, 13(1): 95. DOI:10.1186/1472-6947-13-9.
[48]  Zuniga, A.E., Win, K.T., Susilo, W. (2010). Biometrics for electronic health records. J.Med Syst, 34(5): 975–83. DOI:10.1007/ s10916-009-9313-6.
[49]  Babamiri, B., Bahari, D., Salimi, A. (2019). Highly sensitive bio-affinity electrochemiluminescence sensors: Recent advances and future directions. Biosensors and Bioelectronics, 111530. DOI: https://doi.org/10.1016/j.bios.2019.111530.
[50]  Khan, R.I. and Pathan, A.S. (2018). The state-of-the-art wireless body area sensor networks: A survey. International Journal of Distributed Sensor Networks, 14(4):1–16. DOI: 10.1177/1550147718768994.
[51]  Glasgow, R.E. (1995). A Practical Model of Diabetes Management and Education. DiabetesCare, 18(1): 117–126.
[52]  Bashshur, R.L. Howell, J.D., Krupinski, E.A., Harms, K.M., Bashshur, N., Doarn, C.R. (2016). The empirical foundations of telemedicine interventions in primary care. Telemedicine E-Health, 22(5): 342–75. DOI:10.1089/tmj.2016.0045.
[53]  Mitchell, M. and Kan, L. (2019). Digital Technology and the future of Health Systems. Health Systems & Reform, 5(2), 11-120, DOI: 10.1080/23288604.2019.1583040.
[54]  WHO. (2019). WHO developing guidelines for recommendations on digital health interventions for RMNCAH and health systems strengthening. url: https://who.int/reproductivehealth/topics/mhealth/digital-health-interventions/en/? [accessed 2019 Jan 19].
[55]  Dias, D and Cunha, J.P. (2018). Wearable health devices — vital sign monitoring, systems and technologies. Sensors, 18(8): 2414. DOI:10.3390/s18082414.
[56]  Wyber, R., Vaillancourt, S., Perry, W., Mannava, P., Folaranmi, T., Celi, L.A. (2015). Big data in global health: improving health in lowand middle-income countries. WHO. url: https://www.who.int/bulletin/volumes/93/3/14-139022/en/. [accessed 2019 Jan 19].
[57]  Miah, M.R. (2020). Corona virus wide-reaching through sensor technology, Chapter 18. Cyber Dajjal: Obstacle to good health. Paprhi Prakash, Rangmahal Tower, Bandar Bazar, Sylhet, Bangladesh, pp. 115-121. ISBN: 978-984-586-041-3. URL: https://rokomari.com/book/202988/cyber-dazzal---sushaysther-ontoray (Bengali language).
[58]  Ross MK, Wei W, Ohno-Machado L. (2014) Big data and the electronic health record. Yearb Med Inform, 9:97–104. doi:10.15265/IY-2014-0003.
[59]  WHO. (2016). Global observatory for eHealth. Geneva (Switzerland): Malawi. World Health Organization. url: https://www.who.int/goe/policies/countries/mwi/en/ [accessed 2019 Jan 19].
[60]  Miah, M.R. (2021). Global Cyber War and Peaceful World. Lap-publishing, Germany, 115-121. ISBN: 978-984-586-055-0 (Manuscript submitted).
[61]  Forouzanfar M.H., Alexander, L., Anderson, H.R., Bachman, V.F., Biryukov, S., Brauer, M., Burnett, R., Casey, D., Coates, M.M., Cohen, A., Delwiche, K., Estep, K., Frostad, J.J., Astha, K.C., Kyu, H.H., Moradi-Lakeh, M., Ng, M…. et al., (2015). Global, regional, and national comparative risk assessment of 79 behavioural, environmental and occupational, and metabolic risks or clusters of risks in 188 countries, 1990-2013: a systematic analysis for the Global Burden of Disease Study 2013. Lancet, 386(10010): 2287-323. DOI: 10.1016/S0140-6736(15)00128-2.
[62]  Bram, J.T., Warwick-Clark, B., Obeysekar, E. and Mehta, K. (2015). Utilization and monetization of healthcare data in developing countries. Big Data, 3(2):59–66. DOI: 10.1089/big.2014.0053.
[63]  Baker, W.E. (2009). Evaluation of physician competency and clinical performance in emergency medicine. Emerg Med Clin North Am, 27(4): 615–26. DOI: 10.1016/j.emc.2009.07.010.
[64]  Mowafi, H., Sakr, H., Ravaghi, H., Elmahal, O., Slama, S., Samhouri, D., and Relan, P. (2020). Leveraging the COVID-19 response to improve emergency care systems in the Eastern Mediterranean Region. East Mediterr Health J., 26(6): 626-629. https://doi.org/10.26719/2020.26.6.626.
[65]  WHO (World Health Organization). (2020a). Media Briefing. WHO Director-General’s opening remarks at the media briefing on COVID-19. Geneva: World Health Organization, 11 March 2020. URL: https://4m.cn/zO4tD (accessed 26 March 2020).
[66]  Butun I., Morgera S. and Sankar R. (2014). A survey of intrusion detection systems in wireless sensor networks. IEEE Commun. Surv. Tutor, 16: 266–282. DOI: 10.1109/SURV.2013.050113.00191.
[67]  Claeson, M. (2020). An effective national response to COVID-19: what not to learn from Sweden. BMJ Blogs, 1-2. URL: https://4m.cn/yw4BQ (Accessed time on January 03, 2021 at 10:00 am).
[68]  Habib, H. (2020). Coronavirus: Has Sweden’s controversial covid-19 strategy been successful? BMJ, 369:m2376. DOI: http://dx.doi.org/10.1136/bmj.m2376.
[69]  Irwin, R.E. (2020). Misinformation and de-contextualization: international media reporting on Sweden and COVID-19. Global Health, 16, 62, 1-12. DOI: https://doi.org/10.1186/s12992-020-00588-x.
[70]  WHO. (2020c). WHO works with the Government of the United Kingdom to tackle misinformation. World Health Organization (WHO). URL: https://4m.cn/H5TR7 (Accessed time on January 11, 2021 at 12:00pm.).
[71]  WHO. (2020d,). Managing the COVID-19 infodemic: Promoting healthy behaviours and mitigating the harm from misinformation and disinformation. Joint statement by WHO, UN, UNICEF, UNDP, UNESCO, UNAIDS, ITU, UN Global Pulse, and IFRC on September 23, 2020. URL: https://4m.cn/yvXUI (Accessed time on January 9, 2021 at 10:00am).
[72]  UNICEF. (2020, November 12). COVID-19, the Infodemic, & Fake News. What the Experts Say: Coronavirus & Children. URL: https://www.unicef-irc.org/events/covid-19-the-infodemic-and-fake-news.html (Accessed time on January 14, 2020 at 09:00 am).
[73]  Galvão, J. (2020, October 5). COVID-19: the deadly threat of misinformation. Correspondence. Lancet Infectious Diseases, 20: 875. DOI: https://doi.org/10.1016/ S1473-3099(20)30721-0. URL: https://www.thelancet.com/action/showPdf?pii=S1473-3099%2820%2930721-0.
[74]  Roozenbeek, J., Schneider, C.R., Dryhurst, S., Kerr, J., Freeman, A.L.J., Recchia, G., vander Bles, A.M., van der Linden, S. (2020). Susceptibility to misinformation about COVID-19 around the world. Royal Society Open Science, 7: 201199, 1-15. DOI: http://dx.doi.org/10.1098/rsos.201199.
[75]  Dhaka Tribune. (2020). Covid-19 misinformation on social media causes hundreds of deaths. Published at 10:43 am August 13th, 2020. URL: https://4m.cn/2Semm (Accessed time on January 14, 2021 at 10:00 am).
[76]  Giles Keir. (2020, April 9). Beware Russian and Chinese Positioning for after the pandemic. Chatham house. URL: https://4m.cn/C3Ezl (Accessed time on January 10, 2021 at 3:00 pm.).
[77]  Cinelli, M., Quattrociocchi, W., Galeazzi, A., Valensise, C.M., Brugnoli, E., Schmidt, A.L., Zola, P., Zollo, F. & Scala, A. (2020). The COVID-19 social media infodemic. Scientific Report, 10, 16598. DOI: https://doi.org/10.1038/s41598-020-73510-5.
[78]  UN News. (2020, 29 September). COVID-19: Legitimate concerns must be heard, and fears addressed over misinformation. Global Perspectives Human Stories. Health. UN General Assembly. UN Under-Secretary General for Global Communications. URL: https://news.un.org/en/story/2020/09/1074112 (Accessed time on January 14, 2021 at 11:00 am).
[79]  Islam, M.S., Sarkar, T., Khan, S.H., Kamal, A.H.M., Hasan, S.M.M., Kabir, A., Yeasmin, D., Islam, M.A., Chowdhury, K.I.A.C., Anwar, K.S., Chughtai, A.A., Seale, H. (2020). COVID-19–related infodemic and its impact on public health: a global social media analysis. The American Journal of Tropical Medicine and Hygiene, 1621-1629. doi:10.4269/ajtmh.20-0812.
[80]  Saheeh International. (2021). Al-Quran. English Translation. Quran.com. Surah Al Imran, Verse 139. URL: https://quran.com/3/139?translations=20,85,101 (Accessed time on January 17, 2021 at 12:00 pm).
[81]  COVAX. (2020). COVAX: COVID-19 Tools Accelerator. URL: https://www.unicef.org/coronavirus/covax (Accessed time on January 16, 2021 at 9:00 am).
[82]  UNICEF. (2021, January 8). What you need to know about a COVID-19 vaccine. URL: https://www.unicef.org/coronavirus/what-you-need-to-know-covid-vaccine (Accessed time on January 16, 2021 at 12:00 pm).
[83]  Milken Institute. (2021, January 14). COVID-19 Treatment AND Vaccine Tracker. URL: https://covid-19tracker.milkeninstitute.org/ (Accessed time on January 16, 2021 at 11:00 am).
[84]  Sujan, M.A. (2020. Dec10). Covid-19 Vaccine: The poor may face disparity. The Daily Star, Dhaka, Bangladesh. URL: https://4m.cn/UcwTv (Accessed time on January 16, 2021 at 10:00 am).
[85]  IANS. (2021, February 7, 2021). Global COVID-19 Deaths 2.3 million: Johns Hopkins. URL: https://en.prothomalo.com/international/global-covid-19-deaths-near-2-million-johns-hopkins (Accessed to time on February 8, 2021 at 12:00 pm).
[86]  Shishir Morol. (2021, January 16). Interest in vaccines, fear of untruth-half-truth-misinformation. URL: https://www.prothomalo.com/bangladesh/coronavirus/ (Accessed time on January 16, 2021 at 8:00 am).
[87]  Hilali and Khan (2021). The Noble Quran. The Surah Ar-Rum (The Romans), Verse-41. URL: http://en.noblequran.org/quran/surah-ar-rum/ayat-41/ (Accessed time on January 16, 2021 at 9am).
[88]  Chang, T.H., Chou, C.C., Chang, L.Y. (2020). Effect of obesity and body mass index on coronavirus disease 2019 severity: A systematic review and meta‐analysis. Obesity Reviews. DOI: https://doi.org/10.1111/obr.13089.
[89]  BBC News. (2020). Coronavirus: Obesity 'increases risks from Covid-19. Coronavirus pandemic. URL: https://www.bbc.com/news/health-53921141 (Accessed time on January 16, 2021 at 1:00 pm).
[90]  Wadman, M. (2020). Why COVID-19 is more deadly in people with obesity—even if they’re young. Science. URL: https://4m.cn/L3nR7.
[91]  Mahase, E. (2020). Covid-19: Why are age and obesity risk factors for serious disease? News Briefing. BMJ, 371. DOI: https://doi.org/10.1136/bmj.m4130 (Published 26 October 2020).
[92]  CDC. (2021). Facts about Down Syndrome. Centers for Disease Control, USA.URL: https://www.cdc.gov/ncbddd/birthdefects/downsyndrome.html (accessed time on January 15, 2021 at 10:00 am).
[93]  CDC. (2021a). People with Certain Medical Conditions. Centers for Disease Control, USA. URL: https://4m.cn/oUXcT (Accessed time on January 16, 2021 at 8:00 am).
[94]  Al-Salameh, A., Lanoix, J.P., Bennis, Y., Andrejak, C., Brochot, E., Deschasse, G., Dupont, H., Goeb, V., Jaureguy, M., Lion, S., Maizel, J., Moyet, J., Vaysse, B., Desailloud, R., Ganry, O., Schmit, J.L., Lalau. J. D. (2020). The association between body mass index class and coronavirus disease 2019 outcomes. International Journal of Obesity, 1-6. DOI: https://doi.org/10.1038/s41366-020-00721-1.
[95]  Huang, C., Wang, Y., Li, X., Ren, L., Zhao, J., Hu,Y., Zhang, L., Fan, G., Xu, J., Gu, X., Cheng, Z., Yu, T., Xia, J., Wei, Y., Wu, W., Xie, X., Yin,W., Li, H., Liu, M., Xiao, Y., Gao,H., Guo,L., Xie, J., Wang, G., Jiang, R., Gao, Z., Jin, Q., Wang, J. and Cao, B. (2020). Clinical features of patients infected with 2019 novel coronavirus in Wuhan, China. Lancet, 395: 497–506. doi: 10.1016/S0140-6736(20)30183-5.
[96]  Ye, Z.W., Yuan, S., Yuen, K.S., Fung, S.Y., Chan, C.P. and Jin, D.Y. (2020). Zoonotic origins of human coronaviruses. International Journal of Biological sciences, 16(10): 1686-1697. DOI:10.7150/ijbs.45472.
[97]  The Straits Times. (2021, February 7). Where did coronavirus come from? WHO scientists uncover fresh clues. Wuhan (Bloomberg, Reuters). URL: https://4m.cn/hz5AG (Accessed time on February 7, 2021 at 4:00 pm).
[98]  Fujiyama, E.W. and McNeil, S. (2021, February 6). AP Interview: China granted WHO team full access in Wuhan. AP, Wuhan, China. URL: https://apnews.com/article/china-granted-who-full-access-wuhan-52dae25c21db7c80c404251e481f88bc.
[99]  ABC News (2021, February 6). AP Interview: China granted WHO team full access in Wuhan. Washington, US. URL: https://abcnews.go.com/Technology/wireStory/ap-interview-china-granted-team-full-access-wuhan-75712431.
[100]  Mackenzie, J. S., & Smith, D. W. (2020). COVID-19: a novel zoonotic disease caused by a coronavirus from China: what we know and what we don’t. Microbiology Australia. DOI:10.1071/ma20013.
[101]  WIV. (2021, February 6). We’re still missing the origin story of this pandemic. Wuhan Institute of Virology (WIV), Wuhan, China. URL: https://www.washingtonpost.com/opinions/2021/02/05/coronavirus-origins-mystery-china/?arc404=true.
[102]  Alotaibi, M. (2019). Security to wireless sensor networks against malicious attacks using Hamming residue method. J Wireless Com Network, 8. DOI: https://doi.org/10.1186/s13638-018-1337-5.
[103]  Wu, T., Yan, Y., & Chen, X. (2013). Reduction of Power Consumption in Wireless Sensor Networks for Railway Disaster Prevention and Safety Monitoring System. Advances in Intelligent Systems and Computing, 983–991. doi:10.1007/978-3-642-31656-2_135.
[104]  Kumar, P., & Reddy, S. R. N. (2020). Wireless sensor networks: a review of motes, wireless technologies, routing algorithms and static deployment strategies for agriculture applications. CSI Transactions on ICT. doi:10.1007/s40012-020-00289-1.
[105]  Singh, A. P., Luhach, A. K., Gao, X.-Z., Kumar, S., & Roy, D. S. (2020). Evolution of wireless sensor network design from technology centric to user centric: An architectural perspective. International Journal of Distributed Sensor Networks, 16(8), 155014772094913. doi:10.1177/1550147720949138.
[106]  EFAD (2020). COVID Care Pathway. The Voice of European Dietetics. The European Federation of the Associations of Dietitians (EFAD), The Netherlands. URL: https://4m.cn/bZHOT (Accessed time on February 10, 2021 at 12:00 pm).
[107]  Gaub, F. and Boswinkel, L. (2020). The geopolitical implications of the COVID-19 pandemic. Policy Department for External Relations Directorate General for External Policies of the Union PE 603.511 - September 2020, European Parliament's Committee on Foreign Affairs. European Parliament. 1-54. DOI: doi:10.2861/526114.
[108]  Lee, J. J. and Haupt, J. P. (2020). Scientific globalism during a global crisis: research collaboration and open access publications on COVID-19. Higher Education, 1-18. DOI:10.1007/s10734-020-00589-0.
[109]  Cimmino, J., Kroenig, M. and Pavel, B. (2020, June1). Taking stock: Where are geopolitics headed in the COVID-19 era? Atlantic Council. URL: https://4m.cn/kvyLV (Accessed time on February 9, 2021 at 2:00 pm).
[110]  WEF. (2020, July 16). Emerging Pathways towards a Post-COVID-19 Reset and Recovery: Chief Economists Outlook. World Economic Forum (WEF), 1-18. URL: https://www.weforum.org/reports/emerging-pathways-towards-a-post-covid-19-reset-and-recovery (Accessed time on February 10, 2021 at 1:00 pm).
[111]  WEF. (2021, January 25). Platform for Shaping the Future of the New Economy and Society: Chief Economists Outlook 2021. World Economic Forum (WEF), 1-23. URL: https://www.weforum.org/reports/emerging-pathways-towards-a-post-covid-19-reset-and-recovery (Accessed time on February 9, 2021 at 2:00 pm).
[112]  Persaud A, Day G, Ventriglio A, Gupta S, Ramachandran P, Ruiz R, et al. (2018). Geopolitical factors, Foreign Aid and Mental Health II: Value for money. International Journal of Social Psychiatry, 64:786-98.
[113]  Persaud A, Bhat PS, Ventriglio A, Bhugra D. (2018). Geopolitical determinants of health. Industrial Psychiatry Journal, 27 (2): 308-310. DOI: 10.4103/ipj.ipj_71_18.
[114]  Fernández, A.C. (2020, May 29). Covid-19 and geopolitics: first impacts. Do Better, Esade education (Accessed time on February 10, 2021 at 3:00pm).
[115]  Kassal, P., Horak, E., Sigurnjak, M., Steinberg, M. D., & Steinberg, I. M. (2018). Wireless and mobile optical chemical sensors and biosensors. Reviews in Analytical Chemistry, 0(0). doi:10.1515/revac-2017-0024.
[116]  Garzón, V., Pinacho, D. G., Bustos, R.-H., Garzón, G. and Bustamante, S. (2019). Optical Biosensors for Therapeutic Drug Monitoring. Biosensors, 9(4), 132. DOI:10.3390/bios9040132.
[117]  Meneghello, A.,Tartaggia, S., Alvau, M.D., Polo, F., Toffoli, G. (2018). Biosensing technologies for therapeutic drug monitoring. Curr. Med. Chem., 25, 4354–4377.
[118]  Tillett, R. L., Sevinsky, J.R., Hartley, P.D., Kerwin, H., Crawford, N., Gorzalski, A., Laverdure, C., Verma, S.C., Rossetto, C.C., Jackson, D., Farrell, M.J., Hooser, S. V., Pandori, M. (2021). Genomic evidence for reinfection with SARS-CoV-2: a case study. The Lancet Infectious Diseases, 21 (1), 52-58. DOI: https://doi.org/10.1016/S1473-3099(20)30764-7.
[119]  Arons, M.M., Hatfield, K.M., Reddy, S.C., Kimball, A., James, A., Jacobs, J.R. J. Taylor, K. Spicer, A.C. Bardossy, L.P. Oakley, S. Tanwar, J.W. Dyal, J. Harney, Z. Chisty, J.M. Bell, M. Methner, P. Paul, C.M. Carlson, H.P. McLaughlin, N. Thornburg, S. Tong, A. Tamin, Y. Tao, A. Uehara, J. Harcourt, S. Clark, C. Brostrom-Smith, L.C. Page, M. Kay, J. Lewis, P. Montgomery, N.D. Stone, T.A. Clark, M.A. Honein, J.S. Duchin, and J.A. Jernigan, for the Public Health–Seattle and King County and CDC COVID-19 Investigation Team. (2020). Presymptomatic SARS-CoV-2 infections and transmission in a skilled nursing facility. New England Journal of Medicine, 382(22): 2081-2090. DOI:10.1056/NEJMoa2008457.
[120]  Bullard, J., Durst, K., Funk, D., Strong, J.E., Alexander, D., Garnett, L., Boodman, C., Bello, A., Hedley, A., Schiffman, Z., Doan, K., Bastien, N., Li, Y., Caeseele, P.G.V., and Poliquin, G. (2020). Predicting Infectious SARS-CoV-2 From Diagnostic Samples. Clinical Infectious Disease, 1-18. DOI: 10.1093/cid/ciaa638.
[121]  Cheng, H.W., Jian, S.W., Liu, D.P., Ng, T.C., Huang, W.T., Lin, H.H. and Taiwan COVID-19 Outbreak Investigation Team. (2020). Contact Tracing Assessment of COVID-19 Transmission Dynamics in Taiwan and Risk at Different Exposure Periods Before and After Symptom Onset. JAMA Internal Medicine, 180(9), 1156-1163, DOI:10.1001/jamainternmed.2020.2020.
[122]  Kiyuka, P.K., Agoti, C.N., Munywoki, P.K., Njeru, R., Bett, A., Otieno, J.R., Kamau, E., Clark, T.G., van der Hoek, L., Kellam, P., Nokes, D.J. and Cotton, M. (2018). Human Coronavirus NL63 Molecular Epidemiology and Evolutionary Patterns in Rural Coastal Kenya. Journal of Infectious Diseases, 217(11): 1728-1739. DOI: 10.1093/infdis/jiy098.
[123]  Korea CDC (2020). Findings from Investigation and Analysis of re-positive cases. May 19, 2020. Korea Centers for Disease Control and Prevention (KCDC). Available at: https://4m.cn/6K3eS (Accessed time on February 13, 2021 at 11:00 am).
[124]  Li, N., Wang, X., Lv, T. (2020). Prolonged SARS-CoV-2 RNA Shedding: Not a Rare Phenomenon. Journal of Medical Virology, 1-2. DOI: 10.1002/jmv.25952.
[125]  Liu, W.D., Chang, S.Y., Wang, J.T., Tsai, M.J., Hung, C.C., Hsu, C.L. and Chang, S.C. (2020). Prolonged Virus Shedding Even After Seroconversion in a Patient With COVID-19. Journal of Infection, 10; 318-356, S0163-4453(20)30190-0. DOI: 10.1016/j.jinf.2020.03.063.
[126]  Lu, J., Peng, J., Xiong, Q., Liu, Z., Lin, H., Tan, X., Kang, M., Yuan, R., Zeng, L., Zhou, P., Liang, C., Yi, L., du Plessis, L., Song, T., Ma, W., Sun, J., Pybus, O.G. and Ke, C. (2020). Clinical, immunological and virological characterization of COVID-19 patients that test re-positive for SARS-CoV-2 by RT-PCR. EBioMedicine, 10, 2960, 1-8. DOI: https://doi.org/10.1101/2020.06.15.20131748.
[127]  Kujawski, S.A., Wong, K. K., Collins, J.P., Epstein, L., Killerby, M.E., Midgley, C.M., Abedi, G.R., Ahmed, N.S., Almendares, O., Alvarez, F.N., Anderson, K.N., Balter, S., Barry, V., Bartlett, K., Beer, K., Ben-aderet, M.A., Benowitz, I., Biggs, H.M., Binder, A.M., Black, S.R., Bonin, B., Bozio, C.H., Brown, C.M., Bruce, H., Bryant-Genevier, J., Budd, A., Buell, D., Bystritsky, R., Cates, J., Charles, E.M., Stephens, K. C., Chea, N., Chiou, H., Christiansen, D., Chu, V., Cody, S., Cohen, M., Conners, E.E., Curns, A.T., Dasari, V., Dawson, P., DeSalvo,T., Diaz, G., Donahue,M., Donovan, S., Duca, L.M., Erickson, K., Esona, M.D., Evans, S., Falk, J., Feldstein, L.R., Fenstersheib, M., Fischer, M., Fisher, R., Foo, C., Fricchione, M.J., Friedman, O., Fry, A., Galang, R.R., Garcia, M.M., Gerber, S.I., Gerrard, G., Ghinai, I., Gounder, P., Grein, J., Grigg, C., Gunzenhauser, J.D., Gutkin, G.I., Haddix, M., Hall, A.J., Han, G.S., Harcourt, J., Harriman, K., Haupt, T., Haynes, A.K., Holshue, M., Hoover, C., Hunter,
[128]  Gallichotte, E.N., Quicke, K.M., Sexton, N.R., Fitzmeyer, E., Young, M.C., Janich, A.J., Dobos, K., Pabilonia, K.L., Gahm, G., Carlton, E.J., Ebel, G.D., Ehrhart, N. (2020). Longitudinal Surveillance for SARS-CoV-2 RNA Among Asymptomatic Staff in Five Colorado Skilled Nursing Facilities: Epidemiologic, Virologic and Sequence Analysis. (Preprint) Medrxiv. DOI: https://doi.org/10.1101/2020.06.08.20125989externalicon.
[129]  van Kampen, J., van de Vijver, D., Fraaij, P., Haagmans, B., Lamers, M., Okba, N., et al. (2020). Shedding of infectious virus in hospitalized patients with coronavirus disease-2019 (COVID-19): duration and key determinants. (Preprint) Medrxiv. DOI: https://doi.org/10.1101/2020.06.08.20125310.
[130]  Wölfel, R., Corman, V.M., Guggemos, W., Seilmaier, M., Zange, S., Müller, M.A., et al. (2020). Virological assessment of hospitalized patients with COVID-2019. Nature, 581(7809): 465-469. doi:10.1038/s41586-020-2196-x.
[131]  Xiao, F., Sun, J., Xu, Y., Li, F., Huang, X., Li, H., et al. (2020). Infectious SARS-CoV-2 in Feces of Patient with Severe COVID-19. Emerg Infect Dis, 26(8): 10.3201/eid2608.200681. doi:10.3201/eid2608.200681.
[132]  Young, B.E., Ong, S.W.X., Kalimuddin, S., Low, J.G., Ta, S, Y., Loh, J., et al. (2020). Epidemiologic Features and Clinical Course of Patients Infected With SARS-CoV-2 in Singapore. JAMA, 323(15): 1488-1494. doi:10.1001/jama.2020.3204.
[133]  Zou, L., Ruan, F., Huang, M., Liang, L., Huang, H., Hong, Z., et al. (2020). SARS-CoV-2 Viral Load in Upper Respiratory Specimens of Infected Patients. New England Journal of Medicine, 382(12), 1177-1179. doi:10.1056/NEJMc200173.
[134]  Feng, E. (2021, February 9). The Coronavirus Crisis: WHO: 'Very Unlikely' Coronavirus Leaked from Lab, More Study Needed to Trace Source. National Public Radio (NPR) News, USA. URL: https://4m.cn/ikX57 (Accessed time on February 14, 2021 at 10:00 am).
[135]  Miah, M.R. (2020). Concept of Cyber Antichrists, Chapter one. Cyber Dazzal: Sushaysther Ontoray [ed.]. Published by Paprhi Prakash, Sylhet, Bangladesh. ISBN: 978-984-586-041-3. Pp. 1-128. URL: https://www.rokomari.com/book/202988/cyber-dazzal---sushaysther-ontoray (Accessed time on February 13, 2021 at 4:00 pm)
[136]  Krishnan, R. (2020, May 17). Coronavirus conflict is World War 3. The Economic Times, New Delhi, India. URL: https://4m.cn/nua3d (Accessed time on February 14, 2021 at 11:00 am).
[137]  Asthana, S. B. (2020, May 20,). COVID-19 Adds a New Dimension to an Undeclared Third World War. Associate Papers. Future Directions International Pvt. Ltd., Australia. URL: https://4m.cn/DAGeT (Accessed time on February 14, 2021 at 10:00 am).
[138]  Guterres, A. (2020, September 22). A Third World War – Which so Many Had Feared — Has Been Avoided, Says UN Chief, United Nations. Inter press service: News Agency, Rome, Italy. URL: http://www.ipsnews.net/2020/09/third-world-war-many-feared-avoided-says-un-chief/ (Accessed to time on February 14, 2021 at 1:00 pm).