Search results

1 – 10 of 25
Article
Publication date: 26 April 2024

Yansen Wu, Dongsheng Wen, Anmin Zhao, Haobo Liu and Ke Li

This study aims to study the thermal identification issue by harvesting both solar energy and atmospheric thermal updraft for a solar-powered unmanned aerial vehicle (SUAV) and…

Abstract

Purpose

This study aims to study the thermal identification issue by harvesting both solar energy and atmospheric thermal updraft for a solar-powered unmanned aerial vehicle (SUAV) and its electric energy performance under continuous soaring conditions.

Design/methodology/approach

The authors develop a specific dynamic model for SUAVs in both soaring and cruise modes. The support vector machine regression (SVMR) is adopted to estimate the thermal position, and it is combined with feedback control to implement the SUAV soaring in the updraft. Then, the optimal path model is built based on the graph theory considering the existence of several thermals distributed in the environment. The procedure is proposed to estimate the electricity cost of SUAV during flight as well as soaring, and making use of dynamic programming to maximize electric energy.

Findings

The simulation results present the integrated control method could allow SUAV to soar with the updraft. In addition, the proposed approach allows the SUAV to fly to the destination using distributed thermals while reducing the electric energy use.

Originality/value

Two simplified dynamic models are constructed for simulation considering there are different flight mode. Besides, the data-driven-based SVMR method is proposed to support SUAV soaring. Furthermore, instead of using length, the energy cost coefficient in optimization problem is set as electric power, which is more suitable for SUAV because its advantage is to transfer the three-dimensional path planning problem into the two-dimensional.

Details

Aircraft Engineering and Aerospace Technology, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1748-8842

Keywords

Open Access
Article
Publication date: 7 July 2022

Sirilak Ketchaya and Apisit Rattanatranurak

Sorting is a very important algorithm to solve problems in computer science. The most well-known divide and conquer sorting algorithm is quicksort. It starts with dividing the…

1254

Abstract

Purpose

Sorting is a very important algorithm to solve problems in computer science. The most well-known divide and conquer sorting algorithm is quicksort. It starts with dividing the data into subarrays and finally sorting them.

Design/methodology/approach

In this paper, the algorithm named Dual Parallel Partition Sorting (DPPSort) is analyzed and optimized. It consists of a partitioning algorithm named Dual Parallel Partition (DPPartition). The DPPartition is analyzed and optimized in this paper and sorted with standard sorting functions named qsort and STLSort which are quicksort, and introsort algorithms, respectively. This algorithm is run on any shared memory/multicore systems. OpenMP library which supports multiprocessing programming is developed to be compatible with C/C++ standard library function. The authors’ algorithm recursively divides an unsorted array into two halves equally in parallel with Lomuto's partitioning and merge without compare-and-swap instructions. Then, qsort/STLSort is executed in parallel while the subarray is smaller than the sorting cutoff.

Findings

In the authors’ experiments, the 4-core Intel i7-6770 with Ubuntu Linux system is implemented. DPPSort is faster than qsort and STLSort up to 6.82× and 5.88× on Uint64 random distributions, respectively.

Originality/value

The authors can improve the performance of the parallel sorting algorithm by reducing the compare-and-swap instructions in the algorithm. This concept can be used to develop related problems to increase speedup of algorithms.

Details

Applied Computing and Informatics, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2634-1964

Keywords

Open Access
Article
Publication date: 19 May 2022

Akhilesh S Thyagaturu, Giang Nguyen, Bhaskar Prasad Rimal and Martin Reisslein

Cloud computing originated in central data centers that are connected to the backbone of the Internet. The network transport to and from a distant data center incurs long…

1039

Abstract

Purpose

Cloud computing originated in central data centers that are connected to the backbone of the Internet. The network transport to and from a distant data center incurs long latencies that hinder modern low-latency applications. In order to flexibly support the computing demands of users, cloud computing is evolving toward a continuum of cloud computing resources that are distributed between the end users and a distant data center. The purpose of this review paper is to concisely summarize the state-of-the-art in the evolving cloud computing field and to outline research imperatives.

Design/methodology/approach

The authors identify two main dimensions (or axes) of development of cloud computing: the trend toward flexibility of scaling computing resources, which the authors denote as Flex-Cloud, and the trend toward ubiquitous cloud computing, which the authors denote as Ubi-Cloud. Along these two axes of Flex-Cloud and Ubi-Cloud, the authors review the existing research and development and identify pressing open problems.

Findings

The authors find that extensive research and development efforts have addressed some Ubi-Cloud and Flex-Cloud challenges resulting in exciting advances to date. However, a wide array of research challenges remains open, thus providing a fertile field for future research and development.

Originality/value

This review paper is the first to define the concept of the Ubi-Flex-Cloud as the two-dimensional research and design space for cloud computing research and development. The Ubi-Flex-Cloud concept can serve as a foundation and reference framework for planning and positioning future cloud computing research and development efforts.

Details

Applied Computing and Informatics, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2634-1964

Keywords

Article
Publication date: 4 March 2024

Betul Gokkaya, Erisa Karafili, Leonardo Aniello and Basel Halak

The purpose of this study is to increase awareness of current supply chain (SC) security-related issues by providing an extensive analysis of existing SC security solutions and…

Abstract

Purpose

The purpose of this study is to increase awareness of current supply chain (SC) security-related issues by providing an extensive analysis of existing SC security solutions and their limitations. The security of SCs has received increasing attention from researchers, due to the emerging risks associated with their distributed nature. The increase in risk in SCs comes from threats that are inherently similar regardless of the type of SC, thus, requiring similar defence mechanisms. Being able to identify the types of threats will help developers to build effective defences.

Design/methodology/approach

In this work, we provide an analysis of the threats, possible attacks and traceability solutions for SCs, and highlight outstanding problems. Through a comprehensive literature review (2015–2021), we analysed various SC security solutions, focussing on tracking solutions. In particular, we focus on three types of SCs: digital, food and pharmaceutical that are considered prime targets for cyberattacks. We introduce a systematic categorization of threats and discuss emerging solutions for prevention and mitigation.

Findings

Our study shows that the current traceability solutions for SC systems do not offer a broadened security analysis and fail to provide extensive protection against cyberattacks. Furthermore, global SCs face common challenges, as there are still unresolved issues, especially those related to the increasing SC complexity and interconnectivity, where cyberattacks are spread across suppliers.

Originality/value

This is the first time that a systematic categorization of general threats for SC is made based on an existing threat model for hardware SC.

Details

Benchmarking: An International Journal, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1463-5771

Keywords

Article
Publication date: 9 January 2024

Ananda Dwitha Yuniar

Privacy is a sensitive issue in business because it involves how a platform uses consumer personal data. In terms of consumer rights, personal information needs to be protected in…

Abstract

Purpose

Privacy is a sensitive issue in business because it involves how a platform uses consumer personal data. In terms of consumer rights, personal information needs to be protected in the privacy policy (PP). This study describes several aspects of the PP that consumers need to pay attention to, especially points prone to misuse of personal information.

Design/methodology/approach

This research used a taxonomy of consumer privacy concerns in e-commerce to reveal general and specific privacy concerns. The privacy calculus theory was also applied to explore consumer rationalization using (1) consumer knowledge about PP, (2) subjective perception, and (3) proximity to the PP features. Furthermore, the netnographic approach was used to combine the interrelation between technology and social construction. A sample of 378 young consumers in several major cities in Indonesia participated online and offline. Semi-structured interviews were also conducted to gain more in-depth comprehension.

Findings

The results showed that most young consumers have sufficient basic knowledge of the important points of PP. Furthermore, they tend not to read the PP because it is long and cumbersome, and therefore do not wish to expend much cognitive effort on it.

Originality/value

This study provides several results that can be utilized by policymakers or e-commerce companies to pay more attention to PPs for young groups. In addition, e-commerce companies can increase the knowledge of the privacy situation of Internet users in general.

Peer review

The peer review history for this article is available at: https://publons.com/publon/10.1108/IJSE-11-2022-0740

Details

International Journal of Social Economics, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0306-8293

Keywords

Article
Publication date: 28 July 2023

Bidyut Hazarika, Utkarsh Shrivastava, Vivek Kumar Singh and Alan Rea

The COVID-19 pandemic has had far-reaching effects on society and will continue to be a subject of study for researchers in the years to come. Businesses have implemented…

Abstract

Purpose

The COVID-19 pandemic has had far-reaching effects on society and will continue to be a subject of study for researchers in the years to come. Businesses have implemented technologies that reduce reliance on physical currencies, such as e-commerce sites and contactless payments. This study aims to examine the users’ attitudes and behaviors toward mobile payments. The focus is on identifying the most effective techniques and approaches that businesses can use to encourage user adoption of mobile payments.

Design/methodology/approach

This study uses survey data from 396 active mobile payment users across the mid-west region of the USA to test the proposed hypothesis. The snowball sampling approach is used to sample the participants for the data collection. This study uses partial least squares structural equation modeling to test the ten hypotheses proposed in this study.

Findings

This study finds that organizational commitment and privacy customization can significantly overcome users’ protective attitudes toward mobile payments during the pandemic. In addition, providing users with privacy customization options can significantly encourage self-disclosure, which is crucial for transaction authentication and fraud detection.

Originality/value

Envisioned in the backdrop of the COVID pandemic, this is one of the earliest studies investigating the role of privacy customization, self-disclosure and organizational commitment on mobile payment adoption.

Details

Global Knowledge, Memory and Communication, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2514-9342

Keywords

Open Access
Article
Publication date: 15 June 2021

Sarandis Mitropoulos, Christos Mitsis, Petros Valacheas and Christos Douligeris

The purpose of this paper is to investigate the way technology affects the provision of prehospital emergency care, upgrading the quality of services offered and significantly…

2517

Abstract

Purpose

The purpose of this paper is to investigate the way technology affects the provision of prehospital emergency care, upgrading the quality of services offered and significantly reducing the risk of premature termination of the patients.

Design/methodology/approach

The paper presents the development of the eEKAB, a pilot emergency medical information system that simulates the main services offered by the Greek National Instant Aid Centre (EKAB). The eEKAB was developed on an agile system methodology. From a technical perspective, the features and the technology were mainly chosen to provide reliable and user-friendly interfaces that will attract many users. eEKAB is based on three important pillars for offering health care to the patients: the “On-time Incident Reporting”, the “On-time Arrival at the Incident” and “Transfer to the Health Center”. According to the literature review, the emergency medical services (EMS) systems that combine all the features are very few.

Findings

It reduces the total time of the EMS procedures and it allows for an easier management of EMS, by providing a better allocation of human resources and a better geographical distribution of ambulances. The evaluation displayed that it is a very helpful application for the ambulance drivers as it reduces the ambulance response time to arrive in the patient's location and contributes significantly to the general performance of the prehospital medical care system. Also, the survey verified the importance of implementing eEKAB on a larger scale beyond the pilot usage. It is worth mentioning that the younger ambulance drivers had a more positive view for the purpose of the application.

Research limitations/implications

The paper clearly identifies implications for further research. Regarding interoperability, the mobile app cooperates with the Operational Center of EKAB, while further collaboration could be achieved with other operational ambulance handling center, mainly, of the private sector. The system can evolve to include better communications among the EKAB departments. Particularly, the ambulance crew as well as the doctors should be informed with more incident features such as the emergency signal so that they know whether to open the siren, the patient's name, etc. The authors are currently working on implementing some features to provide effective medical health services to the patient in the ambulance.

Practical implications

eEKAB will have very significant implications in case of its enforcement, such as the reduction of the total time of EMS procedures with a corresponding reduction of the operating costs of an accident management system and an ambulance fleet handling system while in parallel informing in time the doctors/clinics. It will provide better distribution of ambulances as well as of total human resources. It will greatly assist ambulance drivers, while reducing ambulance response time to reach the patient's location. In other words, the authors will have a better performance of the whole prehospital care system.

Social implications

Providing emergency care before the hospital is of great importance for upgrading the quality of health services provided at the accident site, thus significantly reducing the risk of premature death of patients. This in itself has a significant social implication.

Originality/value

The paper demonstrates a solid understanding in the field of the EMS systems and the corresponding medical services offered. It proposes the development of an effective, feasible and innovative EMS information system that will improve the existing emergency health care system in Greece (EKAB). An in depth literature review and presentation of the adopted new technologies and the respective architecture take place. An evaluation and statistical validation were conducted for proving the high applicability of eEKAB in case of real-life running.

Details

Applied Computing and Informatics, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2634-1964

Keywords

Article
Publication date: 3 January 2024

Miao Ye, Lin Qiang Huang, Xiao Li Wang, Yong Wang, Qiu Xiang Jiang and Hong Bing Qiu

A cross-domain intelligent software-defined network (SDN) routing method based on a proposed multiagent deep reinforcement learning (MDRL) method is developed.

Abstract

Purpose

A cross-domain intelligent software-defined network (SDN) routing method based on a proposed multiagent deep reinforcement learning (MDRL) method is developed.

Design/methodology/approach

First, the network is divided into multiple subdomains managed by multiple local controllers, and the state information of each subdomain is flexibly obtained by the designed SDN multithreaded network measurement mechanism. Then, a cooperative communication module is designed to realize message transmission and message synchronization between the root and local controllers, and socket technology is used to ensure the reliability and stability of message transmission between multiple controllers to acquire global network state information in real time. Finally, after the optimal intradomain and interdomain routing paths are adaptively generated by the agents in the root and local controllers, a network traffic state prediction mechanism is designed to improve awareness of the cross-domain intelligent routing method and enable the generation of the optimal routing paths in the global network in real time.

Findings

Experimental results show that the proposed cross-domain intelligent routing method can significantly improve the network throughput and reduce the network delay and packet loss rate compared to those of the Dijkstra and open shortest path first (OSPF) routing methods.

Originality/value

Message transmission and message synchronization for multicontroller interdomain routing in SDN have long adaptation times and slow convergence speeds, coupled with the shortcomings of traditional interdomain routing methods, such as cumbersome configuration and inflexible acquisition of network state information. These drawbacks make it difficult to obtain global state information about the network, and the optimal routing decision cannot be made in real time, affecting network performance. This paper proposes a cross-domain intelligent SDN routing method based on a proposed MDRL method. First, the network is divided into multiple subdomains managed by multiple local controllers, and the state information of each subdomain is flexibly obtained by the designed SDN multithreaded network measurement mechanism. Then, a cooperative communication module is designed to realize message transmission and message synchronization between root and local controllers, and socket technology is used to ensure the reliability and stability of message transmission between multiple controllers to realize the real-time acquisition of global network state information. Finally, after the optimal intradomain and interdomain routing paths are adaptively generated by the agents in the root and local controllers, a prediction mechanism for the network traffic state is designed to improve awareness of the cross-domain intelligent routing method and enable the generation of the optimal routing paths in the global network in real time. Experimental results show that the proposed cross-domain intelligent routing method can significantly improve the network throughput and reduce the network delay and packet loss rate compared to those of the Dijkstra and OSPF routing methods.

Details

International Journal of Intelligent Computing and Cybernetics, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1756-378X

Keywords

Article
Publication date: 17 October 2022

Santosh Kumar B. and Krishna Kumar E.

Deep learning techniques are unavoidable in a variety of domains such as health care, computer vision, cyber-security and so on. These algorithms demand high data transfers but…

50

Abstract

Purpose

Deep learning techniques are unavoidable in a variety of domains such as health care, computer vision, cyber-security and so on. These algorithms demand high data transfers but require bottlenecks in achieving the high speed and low latency synchronization while being implemented in the real hardware architectures. Though direct memory access controller (DMAC) has gained a brighter light of research for achieving bulk data transfers, existing direct memory access (DMA) systems continue to face the challenges of achieving high-speed communication. The purpose of this study is to develop an adaptive-configured DMA architecture for bulk data transfer with high throughput and less time-delayed computation.

Design/methodology/approach

The proposed methodology consists of a heterogeneous computing system integrated with specialized hardware and software. For the hardware, the authors propose an field programmable gate array (FPGA)-based DMAC, which transfers the data to the graphics processing unit (GPU) using PCI-Express. The workload characterization technique is designed using Python software and is implementable for the advanced risk machine Cortex architecture with a suitable communication interface. This module offloads the input streams of data to the FPGA and initiates the FPGA for the control flow of data to the GPU that can achieve efficient processing.

Findings

This paper presents an evaluation of a configurable workload-based DMA controller for collecting the data from the input devices and concurrently applying it to the GPU architecture, bypassing the hardware and software extraneous copies and bottlenecks via PCI Express. It also investigates the usage of adaptive DMA memory buffer allocation and workload characterization techniques. The proposed DMA architecture is compared with the other existing DMA architectures in which the performance of the proposed DMAC outperforms traditional DMA by achieving 96% throughput and 50% less latency synchronization.

Originality/value

The proposed gated recurrent unit has produced 95.6% accuracy in characterization of the workloads into heavy, medium and normal. The proposed model has outperformed the other algorithms and proves its strength for workload characterization.

Details

International Journal of Pervasive Computing and Communications, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 22 August 2022

Ratnmala Nivrutti Bhimanpallewar, Sohail Imran Khan, K. Bhavana Raj, Kamal Gulati, Narinder Bhasin and Roop Raj

Federation analytics approaches are a present area of study that has already progressed beyond the analysis of metrics and counts. It is possible to acquire aggregated information…

34

Abstract

Purpose

Federation analytics approaches are a present area of study that has already progressed beyond the analysis of metrics and counts. It is possible to acquire aggregated information about on-device data by training machine learning models using federated learning techniques without any of the raw data ever having to leave the devices in the issue. Web browser forensics research has been focused on individual Web browsers or architectural analysis of specific log files rather than on broad topics. This paper aims to propose major tools used for Web browser analysis.

Design/methodology/approach

Each kind of Web browser has its own unique set of features. This allows the user to choose their preferred browsers or to check out many browsers at once. If a forensic examiner has access to just one Web browser's log files, he/she makes it difficult to determine which sites a person has visited. The agent must thus be capable of analyzing all currently available Web browsers on a single workstation and doing an integrated study of various Web browsers.

Findings

Federated learning has emerged as a training paradigm in such settings. Web browser forensics research in general has focused on certain browsers or the computational modeling of specific log files. Internet users engage in a wide range of activities using an internet browser, such as searching for information and sending e-mails.

Originality/value

It is also essential that the investigator have access to user activity when conducting an inquiry. This data, which may be used to assess information retrieval activities, is very critical. In this paper, the authors purposed a major tool used for Web browser analysis. This study's proposed algorithm is capable of protecting data privacy effectively in real-world experiments.

Details

International Journal of Pervasive Computing and Communications, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1742-7371

Keywords

1 – 10 of 25