Search results
1 – 10 of 29Martin Kuehnhausen and Victor S. Frost
Security and accountability within the transportation industry are vital because cargo theft could amount to as much as $60 billion per year. Since goods are often handled by many…
Abstract
Purpose
Security and accountability within the transportation industry are vital because cargo theft could amount to as much as $60 billion per year. Since goods are often handled by many different parties, it must be possible to tightly monitor the location of cargo and handovers. Tracking trade is difficult to manage in different formats and legacy applications Web services and open standards overcome these problems with uniform interfaces and common data formats. This allows consistent reporting, monitoring and analysis at each step. The purpose of this paper is to examine Transportation Security SensorNet (TSSN), the goal being to promote the use of open standards and specifications in combination with web services to provide cargo monitoring capabilities.
Design/methodology/approach
This paper describes a system architecture for the TSSN targeted for cargo monitoring. The paper discusses cargo security and reviews related literature and approaches. The paper then describes the proposed solution of developing a service‐oriented architecture (SOA) for cargo monitoring and its individual components.
Findings
Web services in a mobile sensor network environment have been seen as slow and producing significant overhead. The authors demonstrate that with proper architecture and design the performance requirements of the targeted scenario can be satisfied with web services; the TSSN then allows sensor networks to be utilized in a standardized and open way through web services.
Originality/value
The integration of SOA, open geospatial consortium (OGC) specifications and sensor networks is complex and difficult. As described in related works, most systems and research focus either on the combination of SOA and OGC specifications or on OGC standards and sensor networks. The TSSN shows that all three can be combined and that this combination provides cargo security and monitoring capabilities to the transportation and other industries that have not existed before.
Details
Keywords
Karlene Cousins and Daniel Robey
The purpose of this paper is to explore the role that mobile technologies play in mobile workers’ efforts to manage the boundaries between work and non-work domains. Previous…
Abstract
Purpose
The purpose of this paper is to explore the role that mobile technologies play in mobile workers’ efforts to manage the boundaries between work and non-work domains. Previous theories of work-life boundary management frame boundary management strategies as a range between the segmentation and integration of work-life domains, but fail to provide a satisfactory account of technology’s role.
Design/methodology/approach
The authors apply the concept of affordances, defined as the relationship between users’ abilities and features of mobile technology, in two field studies of a total of 25 mobile workers who used a variety of mobile devices and services.
Findings
The results demonstrate that the material features of mobile technologies offer five specific affordances that mobile workers use in managing work-life boundaries: mobility, connectedness, interoperability, identifiability and personalization. These affordances persist in their influence across time, despite their connection to different technology features.
Originality/value
The author found that mobile workers’ boundary management strategies do not fit comfortably along a linear segmentation-integration continuum. Rather, mobile workers establish a variety of personalized boundary management practices to match their particular situations. The authors speculate that mobile technology has core material properties that endure over time. The authors surmise that these material properties provide opportunities for users to interact with them in a manner to make the five affordances possible. Therefore, in the future, actors interacting with mobile devices to manage their work-life boundaries may experience affordances similar to those the authors observed because of the presence of the core material properties.
Details
Keywords
Colin Blackman, Simon Forge and Robert Horvitz
The European telecommunications landscape has been transformed over the past 25 years, but spectrum management has remained largely unchanged. The paper seeks to highlight the…
Abstract
Purpose
The European telecommunications landscape has been transformed over the past 25 years, but spectrum management has remained largely unchanged. The paper seeks to highlight the need for a more flexible approach to spectrum management and, in particular, the role of shared spectrum access.
Design/methodology/approach
The paper draws on a research study to examine the value of shared spectrum access, based on a review of the literature, a survey of European national regulatory authorities, and scenario analysis.
Findings
The paper highlights trends in wireless data growth and, in particular, the impact of 4G cellular mobile technology over the next five years. With pressure also growing on the licence‐exempt bands at 2.4 and 5 GHz, a more flexible approach to spectrum management will be required in future, including light licensing, de‐licensing and spectrum sharing.
Originality/value
The paper brings together a range of evidence to show how the current approach to spectrum management is no longer able to cope with the social and economic demands for the radio spectrum. It should be of value to policy makers, industry analysts and academics.
Details
Keywords
Cristina Orsolin Klingenberg, Marco Antônio Viana Borges and José Antônio Valle Antunes Jr
The purpose of this paper is to identify current technologies related to Industry 4.0 and to develop a rationale to enhance the understanding of their functions within a…
Abstract
Purpose
The purpose of this paper is to identify current technologies related to Industry 4.0 and to develop a rationale to enhance the understanding of their functions within a data-driven paradigm.
Design/methodology/approach
A systematic literature review of 119 papers published in journals included in the Journal Citation Report (JCR) was conducted to identify Industry 4.0 technologies. A descriptive analysis characterizes the corpus, and a content analysis identifies the technologies.
Findings
The content analysis identified 111 technologies. These technologies perform four functions related to data: data generation and capture, data transmission, data conditioning, storage and processing and data application. The first three groups consist of enabling technologies and the fourth group of value-creating technologies. Results show that Industry 4.0 publications focus on enabling technologies that transmit and process data. Value-creating technologies, which apply data in order to develop new solutions, are still rare in the literature.
Research limitations/implications
The proposed framework serves as a structure for analysing the focus of publications over time, and enables the classification of new technologies as the paradigm evolves.
Practical implications
Because the technical side of the new production paradigm is complex and represents an evolving field, managers benefit from a simplified and data-driven approach. The proposed framework suggests that Industry 4.0 should be approached by looking at how data can create value and at what role each technology plays in this task.
Originality/value
The study makes a direct link between Industry 4.0 technologies and the key resource of this revolution, i.e. data. It provides a rationale that not only establishes relationships between technologies and data, but also highlights their roles as enablers or creators of value. Beyond showing the current focus of Industry 4.0 publications, this paper proposes a framework that is useful for tracking the evolution of the paradigm.
Details
Keywords
Francis H. Shajin and Paulthurai Rajesh
This study aims to evaluate the direct trust value for each node and calculate the trust value of all nodes satisfying the condition and update the trust value and value each…
Abstract
Purpose
This study aims to evaluate the direct trust value for each node and calculate the trust value of all nodes satisfying the condition and update the trust value and value each trust update interval for a secure and efficient communication between sender and destination node. Hence, a Trusted Secure Geographic Routing Protocol (TSGRP) has been proposed for detecting attackers (presence of the hacker), considering the trust value for a node produced by combining the location trusted information and the direct trusted information.
Design/methodology/approach
Amelioration in the research studies related to mobile ad hoc networks (MANETs) and wireless sensor networks has shown greater concern in the presence of malicious nodes, due to which the delivery percentage in any given network can degrade to a larger extent, and hence make the network less reliable and more vulnerable to security.
Findings
TSGRP has outperformed the conventional protocols for detecting attacks in MANET. TSGRP is establishing a trust-based secure communication between the sender and destination node. The evaluated direct trust value is used after the transmission of route-request and route-reply packets, to evaluate the direct trust value of each node and a secure path is established between the sender and the destination node. The effectiveness of the proposed TSGRP is evaluated through NS-2 simulation.
Originality/value
The simulation results show the delay of the proposed method is 92% less than PRISM approach and the overhead of the proposed TSGRP approach is 61% less than PRISM approach.
Details
Keywords
There is growing concern that some groups without access to high‐speed broadband networks, e.g. those residing in rural and remote areas, will be unable to benefit from online…
Abstract
There is growing concern that some groups without access to high‐speed broadband networks, e.g. those residing in rural and remote areas, will be unable to benefit from online education, health and government services, etc. Such concerns have led to arguments that universal service obligations (USOs) should be upgraded to include access to broadband. This paper reviews the arguments and concludes that, at this stage of broadband development and diffusion, there is no convincing case for USO‐type mandates. Since the case for broadband USOs should be intermittently revisited, the paper proceeds, nevertheless, to explore what would be involved in a systematic review of this issue.
Details
Keywords
Fuyuki Ishikawa, Yasuyuki Tahara, Nobukazu Yoshioka and Shinichi Honiden
A general framework for mobile Web services ‐ which are Web services with the ability to migrate from one host to another ‐ is proposed. In this framework, a mobile Web service is…
Abstract
A general framework for mobile Web services ‐ which are Web services with the ability to migrate from one host to another ‐ is proposed. In this framework, a mobile Web service is composed of a combination of a BPEL process description, service components to be carried, and migration behavior descriptions using simple but expressive rules. The semantics of the descriptions are defined using Mobile Ambients, namely, a formal model of concurrent mobile processes. With this framework, it is thus possible to add or change migration behaviors without having to modify the BPEL process.
Details
Keywords
WenFeng Qin, Yunsheng Xue, Hao Peng, Gang Li, Wang Chen, Xin Zhao, Jie Pang and Bin Zhou
The purpose of this study is to design a wearable medical device as a human care platform and to introduce the design details, key technologies and practical implementation…
Abstract
Purpose
The purpose of this study is to design a wearable medical device as a human care platform and to introduce the design details, key technologies and practical implementation methods of the system.
Design/methodology/approach
A multi-channel data acquisition scheme based on PCI-E (rapid interconnection of peripheral components) was proposed. The flexible biosensor is integrated with the flexible data acquisition card with monitoring capability, and the embedded (device that can operate independently) chip STM32F103VET6 is used to realize the simultaneous processing of multi-channel human health parameters. The human health parameters were transferred to the upper computer LabVIEW by intelligent clothing through USB or wireless Bluetooth to complete the transmission and processing of clinical data, which facilitates the analysis of medical data.
Findings
The smart clothing provides a mobile medical cloud platform for wearable medical through cloud computing, which can continuously monitor the body's wrist movement, body temperature and perspiration for 24 h. The result shows that each channel is completely accurate to the top computer display, which can meet the expected requirements, and the wearable instant care system can be applied to healthcare.
Originality/value
The smart clothing in this study is based on the monitoring and diagnosis of textiles, and the electronic communication devices can cooperate and interact to form a wearable textile system that provides medical monitoring and prevention services to individuals in the fastest and most accurate way. Each channel of the system is precisely matched to the display screen of the host computer and meets the expected requirements. As a real-time human health protection platform technology, continuous monitoring of human vital signs can complete the application of human motion detection, medical health monitoring and human–computer interaction. Ultimately, such an intelligent garment will become an integral part of our everyday clothing.
Details
Keywords
M. Angulakshmi, M. Deepa, M. Vanitha, R. Mangayarkarasi and I. Nagarajan
In this study, we discuss three DTN routing protocols, these are epidemic, PRoPHET and spray and wait routing protocols. A special simulator will be used; that is opportunistic…
Abstract
Purpose
In this study, we discuss three DTN routing protocols, these are epidemic, PRoPHET and spray and wait routing protocols. A special simulator will be used; that is opportunistic network environment (ONE) to create a network environment. Spray and wait has highest delivery rate and low latency in most of the cases. Hence, spray and wait have better performance than others. This analysis of the performance of DTN protocols helps the researcher to learn better of these protocols in the different environment.
Design/methodology/approach
Delay-Tolerant Network (DTN) is a network designed to operate effectively over extreme distances, such as those encountered in space communications or on an interplanetary scale. In such an environment, nodes are occasional communication and are available among hubs, and determinations of the next node communications are not confirmed. In such network environment, the packet can be transferred by searching current efficient route available for a particular node. Due to the uncertainty of packet transfer route, DTN is affected by a variety of factors such as packet size, communication cost, node activity, etc.
Findings
Spray and wait have highest delivery rate and low latency in most of the cases. Hence, spray and wait have better performance than others.
Originality/value
The primary goal of the paper is to extend these works in an attempt to offer a better understanding of the behavior of different DTN routing protocols with delivery probability, latency and overhead ratio that depend on various amounts of network parameters such as buffer size, number of nodes, movement ratio, time to live, movement range, transmission range and message generation rate. In this study, we discuss three DTN routing protocols: these are epidemic, PRoPHET and spray and wait routing protocols. A special simulator will be used; that is opportunistic network environment (ONE) to create a network environment. Spray and wait have highest delivery rate and low latency in most of the cases. Hence, spray and wait have better performance than others. This analysis of the performance of DTN protocols helps the researcher to learn better of these protocols in the different environment.
Details
Keywords
Anastase Adonis and Khalil Drira
This paper aims to provide a methodological road for the next generation of e‐learning environments.
Abstract
Purpose
This paper aims to provide a methodological road for the next generation of e‐learning environments.
Design/methodology/approach
This paper considers a survey of recent publications (1995‐2002), which aim to provide practical and theoretical indications and advice, which are coupled with practical experimentations.
Findings
The paper provides road‐mapping elements, indicating the impact on services and systems to be expected by this design approach.
Research limitations/implications
The survey is based on a selection of sources and it is not exhaustive. The methodology experiments that are used for argumentation are based on the authors’ platform.
Practical implications
The paper presents a useful source of knowledge for researchers and advanced students.
Originality/value
This paper identifies a road for advanced e‐learning systems, and can help researchers and those in industry who desire to introduce and understand the design methodological context of advanced e‐learning systems.
Details