Search results
1 – 10 of 133Jialiang Xie, Shanli Zhang, Honghui Wang and Mingzhi Chen
With the rapid development of Internet technology, cybersecurity threats such as security loopholes, data leaks, network fraud, and ransomware have become increasingly prominent…
Abstract
Purpose
With the rapid development of Internet technology, cybersecurity threats such as security loopholes, data leaks, network fraud, and ransomware have become increasingly prominent, and organized and purposeful cyberattacks have increased, posing more challenges to cybersecurity protection. Therefore, reliable network risk assessment methods and effective network security protection schemes are urgently needed.
Design/methodology/approach
Based on the dynamic behavior patterns of attackers and defenders, a Bayesian network attack graph is constructed, and a multitarget risk dynamic assessment model is proposed based on network availability, network utilization impact and vulnerability attack possibility. Then, the self-organizing multiobjective evolutionary algorithm based on grey wolf optimization is proposed. And the authors use this algorithm to solve the multiobjective risk assessment model, and a variety of different attack strategies are obtained.
Findings
The experimental results demonstrate that the method yields 29 distinct attack strategies, and then attacker's preferences can be obtained according to these attack strategies. Furthermore, the method efficiently addresses the security assessment problem involving multiple decision variables, thereby providing constructive guidance for the construction of security network, security reinforcement and active defense.
Originality/value
A method for network risk assessment methods is given. And this study proposed a multiobjective risk dynamic assessment model based on network availability, network utilization impact and the possibility of vulnerability attacks. The example demonstrates the effectiveness of the method in addressing network security risks.
Details
Keywords
Ahmad Ebrahimi and Sara Mojtahedi
Warranty-based big data analysis has attracted a great deal of attention because of its key capabilities and role in improving product quality while minimizing costs. Information…
Abstract
Purpose
Warranty-based big data analysis has attracted a great deal of attention because of its key capabilities and role in improving product quality while minimizing costs. Information and details about particular parts (components) repair and replacement during the warranty term, usually stored in the after-sales service database, can be used to solve problems in a variety of sectors. Due to the small number of studies related to the complete analysis of parts failure patterns in the automotive industry in the literature, this paper focuses on discovering and assessing the impact of lesser-studied factors on the failure of auto parts in the warranty period from the after-sales data of an automotive manufacturer.
Design/methodology/approach
The interconnected method used in this study for analyzing failure patterns is formed by combining association rules (AR) mining and Bayesian networks (BNs).
Findings
This research utilized AR analysis to extract valuable information from warranty data, exploring the relationship between component failure, time and location. Additionally, BNs were employed to investigate other potential factors influencing component failure, which could not be identified using Association Rules alone. This approach provided a more comprehensive evaluation of the data and valuable insights for decision-making in relevant industries.
Originality/value
This study's findings are believed to be practical in achieving a better dissection and providing a comprehensive package that can be utilized to increase component quality and overcome cross-sectional solutions. The integration of these methods allowed for a wider exploration of potential factors influencing component failure, enhancing the validity and depth of the research findings.
Details
Keywords
Xiaojie Xu and Yun Zhang
For policymakers and participants of financial markets, predictions of trading volumes of financial indices are important issues. This study aims to address such a prediction…
Abstract
Purpose
For policymakers and participants of financial markets, predictions of trading volumes of financial indices are important issues. This study aims to address such a prediction problem based on the CSI300 nearby futures by using high-frequency data recorded each minute from the launch date of the futures to roughly two years after constituent stocks of the futures all becoming shortable, a time period witnessing significantly increased trading activities.
Design/methodology/approach
In order to answer questions as follows, this study adopts the neural network for modeling the irregular trading volume series of the CSI300 nearby futures: are the research able to utilize the lags of the trading volume series to make predictions; if this is the case, how far can the predictions go and how accurate can the predictions be; can this research use predictive information from trading volumes of the CSI300 spot and first distant futures for improving prediction accuracy and what is the corresponding magnitude; how sophisticated is the model; and how robust are its predictions?
Findings
The results of this study show that a simple neural network model could be constructed with 10 hidden neurons to robustly predict the trading volume of the CSI300 nearby futures using 1–20 min ahead trading volume data. The model leads to the root mean square error of about 955 contracts. Utilizing additional predictive information from trading volumes of the CSI300 spot and first distant futures could further benefit prediction accuracy and the magnitude of improvements is about 1–2%. This benefit is particularly significant when the trading volume of the CSI300 nearby futures is close to be zero. Another benefit, at the cost of the model becoming slightly more sophisticated with more hidden neurons, is that predictions could be generated through 1–30 min ahead trading volume data.
Originality/value
The results of this study could be used for multiple purposes, including designing financial index trading systems and platforms, monitoring systematic financial risks and building financial index price forecasting.
Details
Keywords
Xiaojie Xu and Yun Zhang
The Chinese housing market has witnessed rapid growth during the past decade and the significance of housing price forecasting has undoubtedly elevated, becoming an important…
Abstract
Purpose
The Chinese housing market has witnessed rapid growth during the past decade and the significance of housing price forecasting has undoubtedly elevated, becoming an important issue to investors and policymakers. This study aims to examine neural networks (NNs) for office property price index forecasting from 10 major Chinese cities for July 2005–April 2021.
Design/methodology/approach
The authors aim at building simple and accurate NNs to contribute to pure technical forecasts of the Chinese office property market. To facilitate the analysis, the authors explore different model settings over algorithms, delays, hidden neurons and data-spitting ratios.
Findings
The authors reach a simple NN with three delays and three hidden neurons, which leads to stable performance of about 1.45% average relative root mean square error across the 10 cities for the training, validation and testing phases.
Originality/value
The results could be used on a standalone basis or combined with fundamental forecasts to form perspectives of office property price trends and conduct policy analysis.
Details
Keywords
Pratheek Suresh and Balaji Chakravarthy
As data centres grow in size and complexity, traditional air-cooling methods are becoming less effective and more expensive. Immersion cooling, where servers are submerged in a…
Abstract
Purpose
As data centres grow in size and complexity, traditional air-cooling methods are becoming less effective and more expensive. Immersion cooling, where servers are submerged in a dielectric fluid, has emerged as a promising alternative. Ensuring reliable operations in data centre applications requires the development of an effective control framework for immersion cooling systems, which necessitates the prediction of server temperature. While deep learning-based temperature prediction models have shown effectiveness, further enhancement is needed to improve their prediction accuracy. This study aims to develop a temperature prediction model using Long Short-Term Memory (LSTM) Networks based on recursive encoder-decoder architecture.
Design/methodology/approach
This paper explores the use of deep learning algorithms to predict the temperature of a heater in a two-phase immersion-cooled system using NOVEC 7100. The performance of recursive-long short-term memory-encoder-decoder (R-LSTM-ED), recursive-convolutional neural network-LSTM (R-CNN-LSTM) and R-LSTM approaches are compared using mean absolute error, root mean square error, mean absolute percentage error and coefficient of determination (R2) as performance metrics. The impact of window size, sampling period and noise within training data on the performance of the model is investigated.
Findings
The R-LSTM-ED consistently outperforms the R-LSTM model by 6%, 15.8% and 12.5%, and R-CNN-LSTM model by 4%, 11% and 12.3% in all forecast ranges of 10, 30 and 60 s, respectively, averaged across all the workloads considered in the study. The optimum sampling period based on the study is found to be 2 s and the window size to be 60 s. The performance of the model deteriorates significantly as the noise level reaches 10%.
Research limitations/implications
The proposed models are currently trained on data collected from an experimental setup simulating data centre loads. Future research should seek to extend the applicability of the models by incorporating time series data from immersion-cooled servers.
Originality/value
The proposed multivariate-recursive-prediction models are trained and tested by using real Data Centre workload traces applied to the immersion-cooled system developed in the laboratory.
Details
Keywords
Radha Subramanyam, Y. Adline Jancy and P. Nagabushanam
Cross-layer approach in media access control (MAC) layer will address interference and jamming problems. Hybrid distributed MAC can be used for simultaneous voice, data…
Abstract
Purpose
Cross-layer approach in media access control (MAC) layer will address interference and jamming problems. Hybrid distributed MAC can be used for simultaneous voice, data transmissions in wireless sensor network (WSN) and Internet of Things (IoT) applications. Choosing the correct objective function in Nash equilibrium for game theory will address fairness index and resource allocation to the nodes. Game theory optimization for distributed may increase the network performance. The purpose of this study is to survey the various operations that can be carried out using distributive and adaptive MAC protocol. Hill climbing distributed MAC does not need a central coordination system and location-based transmission with neighbor awareness reduces transmission power.
Design/methodology/approach
Distributed MAC in wireless networks is used to address the challenges like network lifetime, reduced energy consumption and for improving delay performance. In this paper, a survey is made on various cooperative communications in MAC protocols, optimization techniques used to improve MAC performance in various applications and mathematical approaches involved in game theory optimization for MAC protocol.
Findings
Spatial reuse of channel improved by 3%–29%, and multichannel improves throughput by 8% using distributed MAC protocol. Nash equilibrium is found to perform well, which focuses on energy utility in the network by individual players. Fuzzy logic improves channel selection by 17% and secondary users’ involvement by 8%. Cross-layer approach in MAC layer will address interference and jamming problems. Hybrid distributed MAC can be used for simultaneous voice, data transmissions in WSN and IoT applications. Cross-layer and cooperative communication give energy savings of 27% and reduces hop distance by 4.7%. Choosing the correct objective function in Nash equilibrium for game theory will address fairness index and resource allocation to the nodes.
Research limitations/implications
Other optimization techniques can be applied for WSN to analyze the performance.
Practical implications
Game theory optimization for distributed may increase the network performance. Optimal cuckoo search improves throughput by 90% and reduces delay by 91%. Stochastic approaches detect 80% attacks even in 90% malicious nodes.
Social implications
Channel allocations in centralized or static manner must be based on traffic demands whether dynamic traffic or fluctuated traffic. Usage of multimedia devices also increased which in turn increased the demand for high throughput. Cochannel interference keep on changing or mitigations occur which can be handled by proper resource allocations. Network survival is by efficient usage of valid patis in the network by avoiding transmission failures and time slots’ effective usage.
Originality/value
Literature survey is carried out to find the methods which give better performance.
Details
Keywords
Elvira Anna Graziano, Flaminia Musella and Gerardo Petroccione
The objective of this study is to investigate the impact of the COVID-19 pandemic on the consumer payment behavior in Italy by correlating financial literacy with digital payment…
Abstract
Purpose
The objective of this study is to investigate the impact of the COVID-19 pandemic on the consumer payment behavior in Italy by correlating financial literacy with digital payment awareness, examining media anxiety and financial security, and including a gender analysis.
Design/methodology/approach
Consumers’ attitudes toward cashless payments were investigated using an online survey conducted from November 2021 to February 2022 on a sample of 836 Italian citizens by considering the behavioral characteristics and aspects of financial literacy. Structural equation modeling (SEM) was used to test the hypotheses and to determine whether the model was invariant by gender.
Findings
The analysis showed that the fear of contracting COVID-19 and the level of financial literacy had a direct influence on the payment behavior of Italians, which was completely different in its weighting. Fear due to the spread of news regarding the pandemic in the media indirectly influenced consumers’ noncash attitude. The preliminary results of the gender multigroup analysis showed that cashless payment was the same in the male and female subpopulations.
Originality/value
This research is noteworthy because of its interconnected examination. It examined the effects of the COVID-19 pandemic on people’s payment choices, assessed their knowledge, and considered the influence of media-induced anxiety. By combining these factors, the study offered an analysis from a gender perspective, providing understanding of how financial behaviors were shaped during the pandemic.
Details
Keywords
This study collected the bibliographic data of 2034 journal articles published in 2000–2021 from Web of Science (WoS) core collection database and adopted two bibliometric…
Abstract
Purpose
This study collected the bibliographic data of 2034 journal articles published in 2000–2021 from Web of Science (WoS) core collection database and adopted two bibliometric analysis methods, namely historiography and keyword co-occurrence, to identify the evolution trend of construction risk management (CRM) research topics.
Design/methodology/approach
CRM has been a key issue in construction management research, producing a big number of publications. This study aims to undertake a review of the global CRM research published from 2000 to 2021 and identify the evolution of the research topics relating to CRM.
Findings
This study found that risk analysis methods have shifted from simply ranking risks in terms of their relative importance or significance toward examining the interrelationships among risks, and that the objects of CRM research have shifted from generic construction projects toward specified types of construction projects (e.g. small projects, underground construction projects, green buildings and prefabricated projects). In addition, researchers tend to pay more attention to an individual risk category (e.g. political risk, safety risk and social risk) and integrate CRM into cost, time, quality, safety and environment management functions with the increasing adoption of various information and communication technologies.
Research limitations/implications
This study focused on the journal articles in English in WoS core collection database only, thus excluding the publications in other languages, not indexed by WoS and conference proceedings. In addition, the historiography focused on the top documents in terms of document strength and thus ignored the role of the documents whose strengths were a little lower than the threshold.
Originality/value
This review study is more inclusive than any prior reviews on CRM and overcomes the drawbacks of mere reliance on either bibliometric analysis results or subjective opinions. Revealing the evolution process of the CRM knowledge domain, this study provides an in-depth understanding of the CRM research and benefits industry practitioners and researchers.
Details
Keywords
An Thi Binh Duong, Tho Pham, Huy Truong Quang, Thinh Gia Hoang, Scott McDonald, Thu-Hang Hoang and Hai Thanh Pham
The present study is performed to identify the propagation mechanism of the ripple effect as well as examine the simultaneous impact of risks on supply chain (SC) performance.
Abstract
Purpose
The present study is performed to identify the propagation mechanism of the ripple effect as well as examine the simultaneous impact of risks on supply chain (SC) performance.
Design/methodology/approach
A theoretical framework with many hypotheses regarding the relationships between SC risk types and performance is established. The data are collected from a large-scale survey supported by a project of the Japanese government to promote sustainable socioeconomic development for the Association of Southeast Asian Nations (ASEAN) region, with the participation of 207 firms. Structural equation modeling (SEM) is used to test the hypotheses of the theoretical framework.
Findings
It is indicated that human-made risk causes operational risk, while natural risk causes both supply risk and operational risk. Furthermore, the impacts of human-made risk and natural risk on performance are amplified through operational risk.
Research limitations/implications
This study is one of the first attempts that identifies the propagation mechanism of the ripple effect and examines the simultaneous impact of risks on performance in construction SCs.
Originality/value
Although many studies on risk management in construction SCs have been carried out, they mainly focus on risk identification or quantification of risk impact. It is observed that research on the ripple effect of disruptions has been very scarce.
Details