Search results
1 – 10 of 31Multipath routing holds a great potential to provide sufficient bandwidth to a plethora of applications in wireless sensor networks. In this paper, we consider the problem of…
Abstract
Multipath routing holds a great potential to provide sufficient bandwidth to a plethora of applications in wireless sensor networks. In this paper, we consider the problem of interference that can significantly affect the expected performances. We focus on the performance evaluation of the iterative paths discovery approach as opposed to the traditional concurrent multipath routing. Five different variants of multipath protocols are simulated and evaluated using different performance metrics. We mainly show that the iterative approach allows better performances when used jointly with an interference-aware metric or when an interference-zone marking strategy is employed. This latter appears to exhibit the best performances in terms of success ratio, achieved throughput, control messages overhead as well as energy consumption.
Details
Keywords
Shihan Meng, Wenxiang Dong, Hong Hu and Yuejiang Li
The purpose of this paper is to analyze the supply chain's resilience in crowd networks from both static and dynamic perspectives.
Abstract
Purpose
The purpose of this paper is to analyze the supply chain's resilience in crowd networks from both static and dynamic perspectives.
Design/methodology/approach
This paper first defines the supply chain’s resilience, then proposes a graphical and game-theoretic framework to evaluate the resilience.
Findings
In this framework, an equilibrium with high resilience will be achieved after the iterated prisoner's dilemma in the supply chain. The two-stage update mechanism contributes to higher profits, higher stability and stronger risk resistance capability. The reputation-based tit-for-tat strategy in the second stage helps to realize society cooperation.
Originality/value
This work pays more attention to the dynamic evolution of interactions between organizations in the supply chain. It provides an important theoretical basis for future work such as how to effectively control and guide the evolution of events in the intelligence network and how to stand sudden changes and avoid collapse.
Details
Keywords
Yuejiang Li and Hong Zhao
The purpose of this paper is to review the recent studies on opinion polarization and disagreement.
Abstract
Purpose
The purpose of this paper is to review the recent studies on opinion polarization and disagreement.
Design/methodology/approach
In this work, recent advances in opinion polarization and disagreement and pay attention to how they are evaluated and controlled are reviewed.
Findings
In literature, three metrics: polarization, disagreement and polarization-disagreement index are usually adopted and there is a tradeoff between polarization and disagreement. Different strategies have been proposed in literature which can significantly control opinion polarization and disagreement based on these metrics.
Originality/value
This review is of crucial importance to summarize works on opinion polarization and disagreement and to the better understanding and control of them.
Details
Keywords
Aaqil Somauroo and Vandana Bassoo
Due to its boundless potential applications, Wireless Sensor Networks have been subject to much research in the last two decades. WSNs are often deployed in remote environments…
Abstract
Due to its boundless potential applications, Wireless Sensor Networks have been subject to much research in the last two decades. WSNs are often deployed in remote environments making replacement of batteries not feasible. Low energy consumption being of prime requisite led to the development of energy-efficient routing protocols. The proposed routing algorithms seek to prolong the lifetime of sensor nodes in the relatively unexplored area of 3D WSNs. The schemes use chain-based routing technique PEGASIS as basis and employ genetic algorithm to build the chain instead of the greedy algorithm. Proposed schemes will incorporate an energy and distance aware CH selection technique to improve load balancing. Clustering of the network is also implemented to reduce number of nodes in a chain and hence reduce delay. Simulation of our proposed protocols is carried out for homogeneous networks considering separately cases for a static base-station inside and outside the network. Results indicate considerable improvement in lifetime over PEGASIS of 817% and 420% for base station inside and outside the network respectively. Residual energy and delay performance are also considered.
Qingqing Wu, Xianguan Zhao, Lihua Zhou, Yao Wang and Yudi Yang
With the rapid development of internet technology, open online social networks provide a broader platform for information spreading. While dissemination of information provides…
Abstract
Purpose
With the rapid development of internet technology, open online social networks provide a broader platform for information spreading. While dissemination of information provides convenience for life, it also brings many problems such as security risks and public opinion orientation. Various negative, malicious and false information spread across regions, which seriously affect social harmony and national security. Therefore, this paper aims to minimize negative information such as online rumors that has attracted extensive attention. The most existing algorithms for blocking rumors have prevented the spread of rumors to some extent, but these algorithms are designed based on entire social networks, mainly focusing on the microstructure of the network, i.e. the pairwise relationship or similarity between nodes. The blocking effect of these algorithms may be unsatisfactory in some networks because of the sparse data in the microstructure.
Design/methodology/approach
An algorithm for minimizing the influence of dynamic rumor based on community structure is proposed in this paper. The algorithm first divides the network into communities, and integrates the influence of each node within communities and rumor influence probability to measure the influence of each node in the entire network, and then selects key nodes and bridge nodes in communities as blocked nodes. After that, a dynamic blocking strategy is adopted to improve the blocking effect of rumors.
Findings
Community structure is one of the most prominent features of networks. It reveals the organizational structure and functional components of a network from a mesoscopic level. The utilization of community structure can provide effective and rich information to solve the problem of data sparsity in the microstructure, thus effectively improve the blocking effect. Extensive experiments on two real-world data sets have validated that the proposed algorithm has superior performance than the baseline algorithms.
Originality/value
As an important research direction of social network analysis, rumor minimization has a profound effect on the harmony and stability of society and the development of social media. However, because the rumor spread has the characteristics of multiple propagation paths, fast propagation speed, wide propagation area and time-varying, it is a huge challenge to improve the effectiveness of the rumor blocking algorithm.
Details
Keywords
Hangjing Zhang, Yan Chen and H. Vicky Zhao
The purpose of this paper is to have a review on the analysis of information diffusion based on evolutionary game theory. People now get used to interact over social networks, and…
Abstract
Purpose
The purpose of this paper is to have a review on the analysis of information diffusion based on evolutionary game theory. People now get used to interact over social networks, and one of the most important functions of social networks is information sharing. Understanding the mechanisms of the information diffusion over social networks is critical to various applications including online advertisement and rumor control.
Design/methodology/approach
It has been shown that the graphical evolutionary game theory (EGT) is a very efficient method to study this problem.
Findings
By applying EGT to information diffusion, the authors could predict every small change in the process, get the detailed dynamics and finally foretell the stable states.
Originality/value
In this paper, the authors provide a general review on the evolutionary game-theoretic framework for information diffusion over social network by summarizing the results and conclusions of works using graphical EGT.
Details
Keywords
Many recommender systems are generally unable to provide accurate recommendations to users with limited interaction history, which is known as the cold-start problem. This issue…
Abstract
Purpose
Many recommender systems are generally unable to provide accurate recommendations to users with limited interaction history, which is known as the cold-start problem. This issue can be resolved by trivial approaches that select random items or the most popular one to recommend to the new users. However, these methods perform poorly in many cases. This paper aims to explore the problem that how to make accurate recommendations for the new users in cold-start scenarios.
Design/methodology/approach
In this paper, the authors propose embedded-bandit method, inspired by Word2Vec technique and contextual bandit algorithm. The authors describe user contextual information with item embedding features constructed by Word2Vec. In addition, based on the intelligence measurement model in Crowd Science, the authors propose a new evaluation method to measure the utility of recommendations.
Findings
The authors introduce Word2Vec technique for constructing user contextual features, which improved the accuracy of recommendations compared to traditional multi-armed bandit problem. Apart from this, using this study’s intelligence measurement model, the utility also outperforms.
Practical implications
Improving the accuracy of recommendations during the cold-start phase can greatly raise user stickiness and increase user favorability, which in turn contributes to the commercialization of the app.
Originality/value
The algorithm proposed in this paper reflects that user contextual features can be represented by clicked items embedding vector.
Details
Keywords
Euodia Vermeulen and Sara Grobbelaar
In this article we aim to understand how the network formed by fitness tracking devices and associated apps as a subset of the broader health-related Internet of things is capable…
Abstract
Purpose
In this article we aim to understand how the network formed by fitness tracking devices and associated apps as a subset of the broader health-related Internet of things is capable of spreading information.
Design/methodology/approach
The authors used a combination of a content analysis, network analysis, community detection and simulation. A sample of 922 health-related apps (including manufacturers' apps and developers) were collected through snowball sampling after an initial content analysis from a Google search for fitness tracking devices.
Findings
The network of fitness apps is disassortative with high-degree nodes connecting to low-degree nodes, follow a power-law degree distribution and present with low community structure. Information spreads faster through the network than an artificial small-world network and fastest when nodes with high degree centrality are the seeds.
Practical implications
This capability to spread information holds implications for both intended and unintended data sharing.
Originality/value
The analysis confirms and supports evidence of widespread mobility of data between fitness and health apps that were initially reported in earlier work and in addition provides evidence for the dynamic diffusion capability of the network based on its structure. The structure of the network enables the duality of the purpose of data sharing.
Details
Keywords
Zhong Wang, Hongbo Sun and Baode Fan
The era of crowd network is coming and the research of its steady-state is of great importance. This paper aims to establish a crowd network simulation platform and maintaining…
Abstract
Purpose
The era of crowd network is coming and the research of its steady-state is of great importance. This paper aims to establish a crowd network simulation platform and maintaining the relative stability of multi-source dissemination systems.
Design/methodology/approach
With this simulation platform, this paper studies the characteristics of “emergence,” monitors the state of the system and according to the fixed point judges the system of steady-state conditions, then uses three control conditions and control methods to control the system status to acquire general rules for maintain the stability of multi-source information dissemination systems.
Findings
This paper establishes a novel steady-state maintenance simulation framework. It will be useful for achieving controllability to the evolution of information dissemination and simulating the effectiveness of control conditions for multi-source information dissemination systems.
Originality/value
This paper will help researchers to solve problems of public opinion control in multi-source information dissemination in crowd network.
Details
Keywords
Oscar F. Bustinza, Luis M. Molina Fernandez and Marlene Mendoza Macías
Machine learning (ML) analytical tools are increasingly being considered as an alternative quantitative methodology in management research. This paper proposes a new approach for…
Abstract
Purpose
Machine learning (ML) analytical tools are increasingly being considered as an alternative quantitative methodology in management research. This paper proposes a new approach for uncovering the antecedents behind product and product–service innovation (PSI).
Design/methodology/approach
The ML approach is novel in the field of innovation antecedents at the country level. A sample of the Equatorian National Survey on Technology and Innovation, consisting of more than 6,000 firms, is used to rank the antecedents of innovation.
Findings
The analysis reveals that the antecedents of product and PSI are distinct, yet rooted in the principles of open innovation and competitive priorities.
Research limitations/implications
The analysis is based on a sample of Equatorian firms with the objective of showing how ML techniques are suitable for testing the antecedents of innovation in any other context.
Originality/value
The novel ML approach, in contrast to traditional quantitative analysis of the topic, can consider the full set of antecedent interactions to each of the innovations analyzed.
Details